Cryptography: Difference between revisions
| Line 6: | Line 6: | ||
* [[Zero Trust]] (ZT) is a cybersecurity paradigm concerned with moving defenses from static, network-based perimeters to a focus on users, assets, and resources.<ref>[https://csrc.nist.gov/publications/detail/sp/800-207/final SP 800-207, NIST]</ref> | * [[Zero Trust]] (ZT) is a cybersecurity paradigm concerned with moving defenses from static, network-based perimeters to a focus on users, assets, and resources.<ref>[https://csrc.nist.gov/publications/detail/sp/800-207/final SP 800-207, NIST]</ref> | ||
* [[Cryptocurrency|Cryptocurrencies]] use proof of work (PoW) to achieve trust. | * [[Cryptocurrency|Cryptocurrencies]] use proof of work (PoW) to achieve trust. | ||
* Trusted certificates create secure connections to a server via the Internet. | * [[SSL Certificate|Trusted certificates]] create secure connections to a server via the Internet. | ||
* [[Trusted Notifier]]s | * [[Trusted Notifier]]s | ||