• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

‘Invisible’ Technologies: What You Can’t See Can Hurt You

October 8, 2017 by Elizabeth V Calise Leave a Comment

There is more to technology than end-user experience. Aside from user experience, there are other considerations like maintenance, operations and 24/7 support. Even though some of these considerations are less visible, they are just as important. When one has a technology that is ubiquitous, it starts to fade and not be well noticed. People tend to notice when there are issues. Something to compare this to is when you only notice your plumbing system when there is a leak. Other than that you do not think twice about. There are technologies that are very important to the business environment and keep the organization running smoothly, yet the awareness for the technology falls under the radar. Since these technologies operate below the radar, it is a high possibility they are not being examined from a risk perspective. Some examples of this are TLS, SSH, SAML and Kerberos.

Using TLS to take the example further, there are several issues that may not come to mind instantly. Legacy protocol version are known to be susceptible to attack and usage related issues like HTTPS Interception.

 

https://www.technewsworld.com/story/84852.html

Filed Under: Week 06: Sniffers Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in