![]() However, if the disk is encrypted, the bad guy has little chance to compromise your network. If the stolen computer is a domain member, a hacker can use its trust relationship to access other machines in your organization. Brute force attacks to crack cached passwords is only one option. ![]() ![]() ![]() Once an attacker has physical access to one of your company’s system disks, this opens a variety of ways to attack your whole network. But what about the security relevant data that is stored on every system disk? Password hashes for example. Let's forget for a moment that this is probably only an excuse. Okay, you say you don't have any confidential data in your organization.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |