ABSTRACT

The perimeter failed in that invaders were allowed inside and never crossed a boundary that would have triggered any sort of security system. The way the world looks at network security must change from just looking outward to more of a security in-depth approach. The socially engineered hack continues to be the top way for hackers to get past information technology (IT) professionals' perimeter defenses, and the concept of having a single password to allow their employees into multiple services has been the holy grail of many security vendors. The similarity goes further in that much of the security revolves around whom IT professionals login as and where they are logging in from. There is a great amount of dependency on the assumption that IT professionals' web browser isn’t leaving behind personally identifiable information in the form of cookies, temp files, and other such things.