© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_2

2. Introduction: “The Human”

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

As a reader, you may have noticed that the entire previous introduction was enclosed in quotes. The mysterious footnote at the end should help clarify the purpose. The identity that created the introduction on ITDR1 (Identity Threat Detection and Response) was actually not my penmanship, but rather generative artificial intelligence. This is the reality of the world we live in today.

Machines can behave like humans, but humans have a challenging time behaving as efficiently ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.