Chasing a User’s Identity
In the last chapter, you learned techniques to compromise a system. However, in the current threat landscape those techniques are often not even needed because instead, systems are simply compromised using stolen credentials. According to the 2021 Data Breach Investigation Report from Verizon, credentials are still the most prevalent data type that attackers are looking for. The same report also highlights that 61 percent of data breaches are caused by leaked credentials. This threat landscape pushes enterprises to develop new strategies to enhance the overall security aspect when it comes to a user’s identity.
In this chapter, we’re going to be covering the following topics:
- Identity is the new perimeter
- Strategies for compromising a user’s identity
- Hacking a user’s identity
We’ll start by discussing why identity came to be such a vital area to protect.