Security without obscurity : a guide to confidentiality, authentication, and integrity /: a guide to confidentiality, authentication, and integrity. (2014)
- Record Type:
- Book
- Title:
- Security without obscurity : a guide to confidentiality, authentication, and integrity /: a guide to confidentiality, authentication, and integrity. (2014)
- Main Title:
- Security without obscurity : a guide to confidentiality, authentication, and integrity
- Further Information:
- Note: Jeffrey James Stapleton.
- Authors:
- Stapleton, Jeffrey James
- Contents:
- Introduction; About This Book; Audience for This Book Guide to This Book; Standards; Standards Organizations ISO TC68 Financial Services ASC X9 Financial Services Standards Depreciation Risk Assessment Threat Analysis Vulnerability Analysis Probability Analysis Impact Analysis Control Adjustments Example Assessment; ; Confidentiality Data Classification Data Groups Data Tagging; Data States Data in Transit Encryption Methods Encryption Methods 2 Encryption Methods 3; Data in Process Data in Storage; Data Encryption Session Encryption Field Encryption Data Tokenization Data Encryption Keys; ; Authentication Authentication Factors Single-Factor Authentication Multifactor Authentication Multisite Authentication; Knowledge Factors Person Entity (PE) Authentication Nonperson Entity (NPE) Authentication Knowledge-Based Authentication (KBA) Zero Knowledge (ZK) Authentication; Possession Factors Hardware Objects Data Objects Software Objects One-Time Passwords (OTP); Biometric Factors Biometric Technology Biometric Enrollment Biometric Verification Biometric Identification; Cryptography Factors Symmetric Cryptography; Asymmetric Cryptography Cryptographic Authentication Cryptographic Protocols; Signature Synonyms Handwritten Signatures Dynamic Signatures Digital Signatures Electronic Signatures; Provisioning; ; Integrity; Integrity Check Value (ICV) Description ICV Composition Integrity Check Points; Data Integrity States; Data in Transit Data in Process Data in Storage; IntegrityIntroduction; About This Book; Audience for This Book Guide to This Book; Standards; Standards Organizations ISO TC68 Financial Services ASC X9 Financial Services Standards Depreciation Risk Assessment Threat Analysis Vulnerability Analysis Probability Analysis Impact Analysis Control Adjustments Example Assessment; ; Confidentiality Data Classification Data Groups Data Tagging; Data States Data in Transit Encryption Methods Encryption Methods 2 Encryption Methods 3; Data in Process Data in Storage; Data Encryption Session Encryption Field Encryption Data Tokenization Data Encryption Keys; ; Authentication Authentication Factors Single-Factor Authentication Multifactor Authentication Multisite Authentication; Knowledge Factors Person Entity (PE) Authentication Nonperson Entity (NPE) Authentication Knowledge-Based Authentication (KBA) Zero Knowledge (ZK) Authentication; Possession Factors Hardware Objects Data Objects Software Objects One-Time Passwords (OTP); Biometric Factors Biometric Technology Biometric Enrollment Biometric Verification Biometric Identification; Cryptography Factors Symmetric Cryptography; Asymmetric Cryptography Cryptographic Authentication Cryptographic Protocols; Signature Synonyms Handwritten Signatures Dynamic Signatures Digital Signatures Electronic Signatures; Provisioning; ; Integrity; Integrity Check Value (ICV) Description ICV Composition Integrity Check Points; Data Integrity States; Data in Transit Data in Process Data in Storage; Integrity Check Methods; Longitudinal Redundancy Check (LRC) Cyclic Redundancy Check (CRC) Hash and Message Digest Message Authentication Code (MAC) Hashed Message Authentication Code (HMAC) Digital Signature Time-Stamp Token (TST); ; Nonrepudiation; Technical Considerations; Cryptographic Considerations; Operational Considerations; Legal Considerations; ; Privacy; Technical Considerations Privacy Data Elements Cross-Border Jurisdictions; Cryptographic Considerations; Operational Considerations; Roles and Responsibilities Security Policy; Legal Considerations European Union (EU) Privacy Directive Canadian Personal Information Protection and Electronic Documents Act (PIPEDA) United Kingdom Data Privacy Act (DPA) United States Privacy Laws and Guidelines Federal Trade Commission (FTC)—Privacy of Consumer Financial Information; Health Insurance Portability and Accountability Act (HIPAA) Fair Credit Reporting Act (FCRA) Federal Privacy Act; ; Key Management; Cryptographic Algorithms Encryption; Message Authentication Code (MAC) Hashed Message Authentication Code (HMAC) Hash Digital Signature Key Transport 7 Key Agreement Summary of Algorithms; Cryptographic Modules Common Criteria NIST Cryptographic Modules ANSI Tamper Resistant Security Modules; ISO Secure Cryptographic Modules ; Key-Management Life Cycle Cryptography Risks Life-Cycle Phases Life-Cycle Controls; Cryptographic Architecture Security Policies, Practices, and Procedures; Key Inventory Network, Data, and Key Diagrams; Public Key Infrastructure Certificate Authority Registration Authority; Subject Relying Party; ; Bibliography; ; Index … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : Auerbach
- Publication Date:
- 2014
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 005.8
Data protection -- Standards
Information technology -- Security measures
Computer security
Computer networks -- Security measures - Languages:
- English
- ISBNs:
- 9781466592155
- Related ISBNs:
- 9781466592148
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; item not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.143868
- Ingest File:
- 02_108.xml