Zero Trust: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
(Create page - source - Chris Skinner - https://thefinanser.com/2025/07/when-you-realise-that-finance-is-science?utm_source=rss&utm_medium=rss&utm_campaign=when-you-realise-that-finance-is-science) |
(Add resource.) |
||
| (3 intermediate revisions by the same user not shown) | |||
| Line 2: | Line 2: | ||
A high level of digital identity security. | A high level of digital identity security. | ||
"Zero trust, unlike Zero Knowledge Proof, does not accept any device or access without verification. In other words you might reveal where Wally is in your identity profile, but I still don’t trust that it’s you without a verification. In addition, I don’t trust your device, system, platform, profile or any other aspect of who you are until you verify. This approach to security means that you cannot access anything until your identity and device that you are using is fully authenticated, identified and been verified. It is pretty much the approach used by many today." | "Zero trust, unlike Zero Knowledge Proof, does not accept any device or access without verification. In other words you might reveal where Wally is in your identity profile, but I still don’t trust that it’s you without a verification. In addition, I don’t trust your device, system, platform, profile or any other aspect of who you are until you verify. This approach to security means that you cannot access anything until your identity and device that you are using is fully authenticated, identified and been verified. It is pretty much the approach used by many today." | ||
| Line 9: | Line 10: | ||
== See also == | == See also == | ||
* [[Authentic Data Chain Containers]] (ADCs) | |||
* [[Behavioural analytics]] | * [[Behavioural analytics]] | ||
* [[Biometric recognition]] | * [[Biometric recognition]] | ||
* [[Biometric signature]] | * [[Biometric signature]] | ||
* [[Biometrics]] | * [[Biometrics]] | ||
* [[Multi-Signature]] (Multi-Sig) | |||
* [[OTP]] | * [[OTP]] | ||
* [[Secure attribution]] | |||
* [[Security]] | * [[Security]] | ||
* [[SSL]] | * [[SSL]] | ||
| Line 20: | Line 24: | ||
==Other | ==Other resources== | ||
*[https://thefinanser.com/2025/07/when-you-realise-that-finance-is-science?utm_source=rss&utm_medium=rss&utm_campaign=when-you-realise-that-finance-is-science Data science in finance - Chris Skinner's Blog - 21 July 2025] | *[https://thefinanser.com/2025/07/when-you-realise-that-finance-is-science?utm_source=rss&utm_medium=rss&utm_campaign=when-you-realise-that-finance-is-science Data science in finance - Chris Skinner's Blog - 21 July 2025] | ||
*[https://medium.com/google-cloud/zero-trust-security-model-a-new-approach-to-network-security-9dee89564b3e Zero Trust Security: A Modern Approach to Securing Your Applications - Sumit k - 24 July 2025] | |||
[[Category:Manage_risks]] | [[Category:Manage_risks]] | ||
Latest revision as of 13:54, 14 August 2025
Digital identity - security.
A high level of digital identity security.
"Zero trust, unlike Zero Knowledge Proof, does not accept any device or access without verification. In other words you might reveal where Wally is in your identity profile, but I still don’t trust that it’s you without a verification. In addition, I don’t trust your device, system, platform, profile or any other aspect of who you are until you verify. This approach to security means that you cannot access anything until your identity and device that you are using is fully authenticated, identified and been verified. It is pretty much the approach used by many today."
Chris Skinner's Blog - 21 July 2025.
See also
- Authentic Data Chain Containers (ADCs)
- Behavioural analytics
- Biometric recognition
- Biometric signature
- Biometrics
- Multi-Signature (Multi-Sig)
- OTP
- Secure attribution
- Security
- SSL
- Trust
- Zero Knowledge Proof (ZKP)