Skip to Content
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
book

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

by Morey J. Haber, Darran Rolls
December 2019
Intermediate to advanced content levelIntermediate to advanced
205 pages
5h 2m
English
Apress
Content preview from Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
© Morey J. Haber, Darran Rolls 2020
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/978-1-4842-5165-2_15

15. Identity Obfuscation

Morey J. Haber1  and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

In this age of identity attack vectors , protecting one’s identity cannot be done stand-alone. There are plenty of opportunities for a threat actor to steal your identity using the very information technology that we embrace every day. We have covered that in detail in previous chapters. However, there is another mitigation approach called Privacy Filters that can limit a threat actor’s ability to create that critical linkage between account, identity, and data and craft identity obfuscation.

Privacy Filters are typically application ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Michael Schwartz, Maciej Machulak

Publisher Resources

ISBN: 9781484251652Purchase LinkPublisher Website