© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_17

17. Identity Digital Transformations

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 
Have you ever pondered the difference between customization and configuration? It is eerily similar to driving a stock Ford Mustang1 vs. a Shelby GT500.2 Both vehicles started in the same manufacturing plant, but in the end, one can be maintained by the dealer, and the other needs a specialized mechanic with expertise in extensive modifications and tuning. While the analogy may sound a little obtuse up front, the real-world implications when deploying a new identity ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.