Aug. 5, 2022, 1:20 a.m. | Jaimandeep Singh, Chintan Patel, Naveen Kumar Chaudhary

cs.CR updates on arXiv.org arxiv.org

A strong cyber attack is capable of degrading the performance of any
Information Technology (IT) or Operational Technology (OT) system. In recent
cyber attacks, credential theft emerged as one of the primary vectors of
gaining entry into the system. Once, an attacker has a foothold in the system,
they use token manipulation techniques to elevate the privileges and access
protected resources. This makes authentication and authorization a critical
component for a secure and resilient cyber system. In this paper we …

architecture authentication authorization design framework risk

Sr. Cloud Security Engineer

@ BLOCKCHAINS | USA - Remote

Network Security (SDWAN: Velocloud) Infrastructure Lead

@ Sopra Steria | Noida, Uttar Pradesh, India

Senior Python Engineer, Cloud Security

@ Darktrace | Cambridge

Senior Security Consultant

@ Nokia | United States

Manager, Threat Operations

@ Ivanti | United States, Remote

Lead Cybersecurity Architect - Threat Modeling | AWS Cloud Security

@ JPMorgan Chase & Co. | Columbus, OH, United States