About the Author |
|
xi | |
|
|
1 | (56) |
|
|
1 | (6) |
|
1.1.1 Audience for This Book |
|
|
1 | (3) |
|
|
4 | (3) |
|
|
7 | (33) |
|
1.2.1 Standards Organizations |
|
|
7 | (3) |
|
1.2.2 ISO TC68 Financial Services |
|
|
10 | (9) |
|
1.2.3 ASC X9 Financial Services |
|
|
19 | (16) |
|
1.2.4 Standards Depreciation |
|
|
35 | (5) |
|
|
40 | (17) |
|
|
42 | (2) |
|
1.3.2 Vulnerability Analysis |
|
|
44 | (4) |
|
1.3.3 Probability Analysis |
|
|
48 | (3) |
|
|
51 | (1) |
|
1.3.5 Control Adjustments |
|
|
52 | (1) |
|
|
53 | (4) |
|
Chapter 2 Confidentiality |
|
|
57 | (34) |
|
|
59 | (6) |
|
|
59 | (5) |
|
|
64 | (1) |
|
|
65 | (9) |
|
|
66 | (1) |
|
2.2.1.1 Encryption Methods |
|
|
66 | (1) |
|
2.2.1.2 Encryption Methods 2 |
|
|
67 | (1) |
|
2.2.1.3 Encryption Methods 3 |
|
|
68 | (1) |
|
|
69 | (2) |
|
|
71 | (3) |
|
|
74 | (17) |
|
|
77 | (3) |
|
|
80 | (2) |
|
|
82 | (4) |
|
2.3.4 Data Encryption Keys |
|
|
86 | (5) |
|
|
91 | (78) |
|
3.1 Authentication Factors |
|
|
94 | (6) |
|
3.1.1 Single-Factor Authentication |
|
|
94 | (4) |
|
3.1.2 Multifactor Authentication |
|
|
98 | (1) |
|
3.1.3 Multisite Authentication |
|
|
99 | (1) |
|
|
100 | (20) |
|
3.2.1 Person Entity (PE) Authentication |
|
|
102 | (9) |
|
3.2.2 Nonperson Entity (NPE) Authentication |
|
|
111 | (4) |
|
3.2.3 Knowledge-Based Authentication (KBA) |
|
|
115 | (1) |
|
3.2.4 Zero Knowledge (ZK) Authentication |
|
|
116 | (4) |
|
|
120 | (17) |
|
|
121 | (8) |
|
|
129 | (2) |
|
|
131 | (5) |
|
3.3.4 One-Time Passwords (OTP) |
|
|
136 | (1) |
|
|
137 | (10) |
|
3.4.1 Biometric Technology |
|
|
139 | (4) |
|
3.4.2 Biometric Enrollment |
|
|
143 | (2) |
|
3.4.3 Biometric Verification |
|
|
145 | (1) |
|
3.4.4 Biometric Identification |
|
|
146 | (1) |
|
|
147 | (10) |
|
3.5.1 Symmetric Cryptography |
|
|
148 | (2) |
|
3.5.2 Asymmetric Cryptography |
|
|
150 | (1) |
|
3.5.3 Cryptographic Authentication |
|
|
151 | (3) |
|
3.5.4 Cryptographic Protocols |
|
|
154 | (3) |
|
|
157 | (4) |
|
3.6.1 Handwritten Signatures |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
3.6.4 Electronic Signatures |
|
|
160 | (1) |
|
|
161 | (8) |
|
|
169 | (30) |
|
4.1 Integrity Check Value (ICV) Description |
|
|
170 | (8) |
|
|
171 | (5) |
|
4.1.2 Integrity Check Points |
|
|
176 | (2) |
|
4.2 Data Integrity States |
|
|
178 | (4) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (2) |
|
4.3 Integrity Check Methods |
|
|
182 | (17) |
|
4.3.1 Longitudinal Redundancy Check (LRC) |
|
|
183 | (1) |
|
4.3.2 Cyclic Redundancy Check (CRC) |
|
|
184 | (2) |
|
4.3.3 Hash and Message Digest |
|
|
186 | (2) |
|
4.3.4 Message Authentication Code (MAC) |
|
|
188 | (2) |
|
4.3.5 Hashed Message Authentication Code (HMAC) |
|
|
190 | (1) |
|
|
191 | (3) |
|
4.3.7 Time-Stamp Token (TST) |
|
|
194 | (5) |
|
|
199 | (12) |
|
5.1 Technical Considerations |
|
|
200 | (3) |
|
5.2 Cryptographic Considerations |
|
|
203 | (1) |
|
5.3 Operational Considerations |
|
|
204 | (2) |
|
|
206 | (5) |
|
|
211 | (26) |
|
6.1 Technical Considerations |
|
|
212 | (4) |
|
6.1.1 Privacy Data Elements |
|
|
212 | (1) |
|
6.1.2 Cross-Border Jurisdictions |
|
|
213 | (3) |
|
6.2 Cryptographic Considerations |
|
|
216 | (1) |
|
6.3 Operational Considerations |
|
|
217 | (4) |
|
6.3.1 Roles and Responsibilities |
|
|
217 | (2) |
|
|
219 | (2) |
|
|
221 | (16) |
|
6.4.1 European Union (EU) Privacy Directive |
|
|
222 | (1) |
|
6.4.2 Canadian Personal Information Protection and Electronic Documents Act (PIPEDA) |
|
|
223 | (1) |
|
6.4.3 United Kingdom Data Privacy Act (DPA) |
|
|
224 | (2) |
|
6.4.4 United States Privacy Laws and Guidelines |
|
|
226 | (2) |
|
6.4.5 Federal Trade Commission (FTC)---Privacy of Consumer Financial Information |
|
|
228 | (2) |
|
6.4.6 Health Insurance Portability and Accountability Act (HIPAA) |
|
|
230 | (2) |
|
6.4.7 Fair Credit Reporting Act (FCRA) |
|
|
232 | (1) |
|
6.4.8 Federal Privacy Act |
|
|
233 | (4) |
|
|
237 | (76) |
|
7.1 Cryptographic Algorithms |
|
|
238 | (19) |
|
|
240 | (4) |
|
7.1.2 Message Authentication Code (MAC) |
|
|
244 | (1) |
|
7.1.3 Hashed Message Authentication Code (HMAC) |
|
|
245 | (1) |
|
|
245 | (2) |
|
|
247 | (3) |
|
|
250 | (2) |
|
|
252 | (2) |
|
7.1.8 Summary of Algorithms |
|
|
254 | (3) |
|
7.2 Cryptographic Modules |
|
|
257 | (18) |
|
|
261 | (2) |
|
7.2.2 NIST Cryptographic Modules |
|
|
263 | (4) |
|
7.2.3 ANSI Tamper Resistant Security Modules |
|
|
267 | (1) |
|
7.2.4 ISO Secure Cryptographic Modules |
|
|
268 | (7) |
|
7.3 Key-Management Life Cycle |
|
|
275 | (11) |
|
|
275 | (2) |
|
|
277 | (4) |
|
7.3.3 Life-Cycle Controls |
|
|
281 | (5) |
|
7.4 Cryptographic Architecture |
|
|
286 | (12) |
|
7.4.1 Security Policies, Practices, and Procedures |
|
|
287 | (4) |
|
|
291 | (5) |
|
7.4.3 Network, Data, and Key Diagrams |
|
|
296 | (2) |
|
7.5 Public Key Infrastructure |
|
|
298 | (15) |
|
7.5.1 Certificate Authority |
|
|
304 | (5) |
|
7.5.2 Registration Authority |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
311 | (2) |
Bibliography |
|
313 | (16) |
Index |
|
329 | |