Identity and Access Management
In this chapter you will learn:
• Various parameters for context-based authentication
• Security issues and best practices for using common authentication protocols
• Security issues with various components of the network environment
• Commonly used exploits against authentication and access systems
The value of identity of course is that so often with it comes purpose.
A 2016 study from Shape Security, a Silicon Valley cybersecurity company, asserted that nearly 90 percent of the password attacks on public-facing company portals were done using automated tools to reuse login and password credentials collected from other breaches. This works because we tend to pick passwords that ...