Thursday, January 10, 2008

Island hopping

The technique of island hopping—penetrating a network through a weak link and then hopping around systems within that network—has been around for years. But it continues to take on new dimensions. In today's security-conscious IT environments, people are often the weakest link, and malicious users are finding ways to use this to their advantage (think phishing and other forms of social engineering).

Read the article HERE.


Post a Comment

Links to this post:

Create a Link

<< Home