Abstract
Imagine you are a hacker suddenly faced with an insurmountable technical challenge: Your target’s email server has been well configured, its publicly known vulnerabilities have been eliminated and an as-yet undisclosed vulnerability is either unobtainable or much too expensive. Do you give up? No, you just ask for the password.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The actual speed at which passwords can be cracked depends on whether the cracking takes place locally or remotely, the latter being significantly slower. The technical characteristics of the security system – the hashing algorithm – also make a difference.
Reference
BSI (2014). Die Lage der IT-Sicherheit in Deutschland 2014. Accessed June 6, 2016, from https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/Lageberichte/Lagebericht2014.pdf?__blob=publicationFile
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Neumann, L. (2017). Human Factors in IT Security. In: Abolhassan, F. (eds) Cyber Security. Simply. Make it Happen.. Management for Professionals. Springer, Cham. https://doi.org/10.1007/978-3-319-46529-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-46529-6_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46528-9
Online ISBN: 978-3-319-46529-6
eBook Packages: Business and ManagementBusiness and Management (R0)