• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

The Keys to the Kingdom

Intercepting and reading your email messages can be a serious problem, but having your authentication credentials, such as your login and password, intercepted is even worse. The theft of your authentication credentials means that attackers can do more than just carry out a one-time reading of your personal email; they can impersonate you at any time from anywhere and continue to do so until you change your authentication credentials.

Case Study 8-3

Tim logged in to the proxy server machine to gather information for his report. The company intranet had been hacked into, and Tim had been asked to go through the proxy server logs and see whether he could gather information on who had carried out this attack and what technique was used.

While he was scanning through the proxy logs, he noticed that logins and passwords entered for access to email were being logged. He scanned the logs for his boss's ID. The password, superb0$$, came up on the screen. “Super boss, yeah right,” thought Tim. He decided that after he had tracked down the hacker, he might log in to email as his boss and see whether his evaluation had been sent to HR. With the login and password, it would be a piece of cake.



PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint