Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
October 2004

Benefits of encryption: Improving your enterprise IT security structure

Despite ample warnings and publicity, the annual Def Con hacker conference always catches a fair number of new victims for its "Wall of Shame"--a compilation of people who expose their passwords and credentials to other attendees. If you use unencrypted POP3 or IMAP to check your e-mail, HTTP to access a Web app, FTP for a file transfer or Telnet for remote access, you too could end up on this list. Worse, you could end up on some hacker's to-do-list, with more dire consequences. Whether you're talking about a compromised host or wide-open wireless networks, eavesdropping is a serious security issue. Hackers only need to control one host on a LAN or VLAN to sniff packets and compromise your network. They can even do this on a switched network using tools like ettercap or arpspoof, which trick hosts into sending traffic to the wrong destination. Consider this: Every packet you send across the Internet passes through a number of routers. Hackers can compromise and reconfigure these hops to route traffic through their machines. ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Preventing spyware and third-party attacks

    by  David Geer, Contributor

    Is your IT infrastructure prepared for spyware? In this feature, learn how to prepare your enterprise for spyware and how best to avoid these third-party attacks.

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close