all InfoSec news
Design Considerations and Architecture for a Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework. (arXiv:2208.02592v1 [cs.CR])
Aug. 5, 2022, 1:20 a.m. | Jaimandeep Singh, Chintan Patel, Naveen Kumar Chaudhary
cs.CR updates on arXiv.org arxiv.org
A strong cyber attack is capable of degrading the performance of any
Information Technology (IT) or Operational Technology (OT) system. In recent
cyber attacks, credential theft emerged as one of the primary vectors of
gaining entry into the system. Once, an attacker has a foothold in the system,
they use token manipulation techniques to elevate the privileges and access
protected resources. This makes authentication and authorization a critical
component for a secure and resilient cyber system. In this paper we …
architecture authentication authorization design framework risk
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Sr. Cloud Security Engineer
@ BLOCKCHAINS | USA - Remote
Network Security (SDWAN: Velocloud) Infrastructure Lead
@ Sopra Steria | Noida, Uttar Pradesh, India
Senior Python Engineer, Cloud Security
@ Darktrace | Cambridge
Senior Security Consultant
@ Nokia | United States
Manager, Threat Operations
@ Ivanti | United States, Remote
Lead Cybersecurity Architect - Threat Modeling | AWS Cloud Security
@ JPMorgan Chase & Co. | Columbus, OH, United States