© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_11

11. Identity Attack Vectors

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

An identity can be attacked by the person owning the identity or any of the related accounts and applications they are responsible for. As an attack surface, we need to think beyond traditional ports, protocols, and services found in information technology and consider the breadth and depth of identity, accounts, entitlements, and access. Identity attack vectors have a risk surface that is not only digital but also physical, and it can be compromised using old-school paper ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.