7
Chasing a User's Identity
In the last chapter, you learned techniques to compromise a system. However, in the current threat landscape those techniques are often not even needed because instead, systems are simply compromised using stolen credentials. According to the 2019 Data Breach Investigation Report from Verizon, 29% of confirmed data breaches happened due to stolen credentials. This threat landscape pushes enterprises to develop new strategies to enhance the overall security aspect of a user's identity.
In this chapter, we're going to be covering the following topics:
- Identity is the new perimeter
- Strategies to compromise a user's identity
- Hacking a user's identity
Identity is the new perimeter
As was briefly explained in Chapter ...
Get Cybersecurity – Attack and Defense Strategies - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.