Thursday, November 16, 2006

Miniature Computers That Can Break Your Network Wide Open

One aspect of information security that is often under looked is physical security... Assuming a network has implemented end to end security in the form of 802.1x or a network access control (NAC) solution they all make one major assumption: that a man in the middle attack can’t be executed once the end point has authenticated. For example 802.1x addresses this directly, if the network port detects that the connection is dropped it requires the end point to re-authenticate before it’s allowed to have network access again. If the network hasn’t implemented such a scheme then it becomes trivial to execute a man in the middle attack by physically inserting another computer in between the network equipment and the end machine...
Read this post in riskbloggers by Kurt Seifried.

0 Comments:

Post a Comment

<< Home