Authentication and Access Control: Practical Cryptography Methods and Tools
Manage episode 504307002 series 3683458
محتوای ارائه شده توسط CyberSecurity Summary. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط CyberSecurity Summary یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Serves as a comprehensive guide to understanding and implementing secure authentication mechanisms. It begins by introducing fundamental cryptographic principles, including symmetric and asymmetric encryption, hash functions, and digital signatures, highlighting their role in ensuring data confidentiality and integrity. The text then explores Public Key Infrastructure (PKI), detailing its components like digital certificates and certificate authorities, and explaining how PKI establishes trust in digital interactions. A significant portion of the book is dedicated to various authentication methods, categorizing them into "something you know" (passwords), "something you have" (tokens), and "something you are" (biometrics), while also addressing common threats and attacks against these methods. Finally, the book examines advanced authentication concepts such as multi-factor authentication, authentication protocols like SSL and Kerberos, and future trends including continuous and cancellable authentication, along with guidelines for designing secure authentication systems.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Authentication-Access-Control-Practical-Cryptography/dp/1484265696?&linkCode=ll1&tag=cvthunderx-20&linkId=2cefebb45aa6899780ee704140e233a3&language=en_US&ref_=as_li_ss_tl
…
continue reading
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Authentication-Access-Control-Practical-Cryptography/dp/1484265696?&linkCode=ll1&tag=cvthunderx-20&linkId=2cefebb45aa6899780ee704140e233a3&language=en_US&ref_=as_li_ss_tl
1000 قسمت