Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Decentralized Identity Explained

You're reading from   Decentralized Identity Explained Embrace decentralization for a more secure and empowering digital experience

Arrow left icon
Product type Paperback
Published in Jul 2024
Publisher Packt
ISBN-13 9781804617632
Length 392 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Rohan Pinto Rohan Pinto
Author Profile Icon Rohan Pinto
Rohan Pinto
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1 - Digital Identity Era: Then
2. Chapter 1: The History of Digital Identity FREE CHAPTER 3. Chapter 2: Identity Management Versus Access Management 4. Part 2 - Digital Identity Era: Now
5. Chapter 3: IAM Best Practices 6. Chapter 4: Trust Anchors/Sources of Truth and Their Importance 7. Chapter 5: Historical Source of Authority 8. Chapter 6: The Relationship between Trust and Risk 9. Chapter 7: Informed Consent and Why It Matters 10. Chapter 8: IAM – the Security Perspective 11. Part 3 - Digital Identity Era: The Near Future
12. Chapter 9: Self-Sovereign Identity 13. Chapter 10: Privacy by Design in the SSI Space 14. Chapter 11: Relationship between DIDs and SSI 15. Chapter 12: Protocols and Standards – DID Standards 16. Chapter 13: DID Authentication 17. Chapter 14: Identity Verification 18. Part 4 - Digital Identity Era: A Probabilistic Future
19. Chapter 15: Biometrics Security in Distributed Identity Management 20. Index 21. Other Books You May Enjoy

Blockchain – a new model for identity

Disrupting the present model of identity, well-matched with customary username and password, biometrics, SSO, and IoT, new identity models are arising, based on a new way of executing federated identities: using blockchain. They aim to bring back users’ privacy, data transparency, and control.

Here are some best practices for managing traditional digital identities that involve safeguarding credentials such as user IDs and passwords:

  • Use strong passwords: Encourage users to choose strong passwords that contain a combination of uppercase and lowercase letters, digits, and special characters. Passwords should be 8-12 characters long and should not contain personal information or popular terms.
  • Enforce password policies: Implement policies that require users to change their passwords regularly and prohibit the reuse of old passwords. Consider using a password manager to generate and store strong, unique passwords for each user.
  • Educate users: Provide training and resources to educate users about the importance of password security and best practices for creating and managing passwords.
  • Implement multi-factor authentication (MFA): Consider adding MFA to user logins to offer an extra layer of protection. In addition to the user’s password, MFA requires the user to submit a second form of verification, such as a fingerprint or a one-time code that’s sent to their mobile device.
  • Monitor user activity: Keep track of user activity and look for signs of suspicious behavior, such as multiple failed login attempts or unusual access patterns.
  • Regularly review and update security policies: Maintain awareness of the most recent security risks and evaluate and update security policies and procedures regularly to guarantee their effectiveness.

By following these best practices, organizations can help ensure that their traditional user IDs and passwords are secure and protected from unauthorized access.

Traditional digital identities, such as usernames and passwords, are widely used in a variety of contexts. Here are some common use cases:

  • Online account management: Usernames and passwords are used to set up and manage online accounts such as email, social networking, and online banking
  • E-commerce: Users provide their digital identities to make purchases and complete transactions on e-commerce sites
  • Employee access: Access to internal corporate systems and resources, such as email, file sharing, and project management tools, is controlled by usernames and passwords
  • Healthcare: Patients use digital identities to access their personal healthcare information, such as medical records and test results
  • Education: Students and faculty members use digital identities to access online course materials and manage their academic records
  • Government services: Digital identities are used to access a range of government services, including tax filings, social security benefits, and voter registration

Overall, traditional digital identities are a fundamental aspect of online security and privacy. They enable users to access a wide range of online services while also providing a layer of protection against unauthorized access and identity theft.

You have been reading a chapter from
Decentralized Identity Explained
Published in: Jul 2024
Publisher: Packt
ISBN-13: 9781804617632
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image