Or even worse, students can disclose their credentials to unauthorized third parties. In the case of educational organizations that manage a network of free access computers for their students, it means that several workstations can unduly be blocked by one user, thus preventing proper sharing of resources.It widens the attack surface of a network as a hacker can seamlessly use valid credentials at the same time as their legitimate owner (and make legitimate user accountable for any illegitimate action he takes).This of course creates a whole accountability and non-repudiation issue as user A, connected to the network with the credentials of user B, can access user B’s data and applications, send e-mails in his name, etc. It increases the ability of users to share their credentials, as there is no consequence on their own access to the network.Here are a few examples of potentially dangerous situations made possible by the absence of simultaneous logins control: However if it is not the same user but two (or more) different persons concurrently using the same credentials, no need to be a rocket scientist to imagine that at least one of them may have harmful intentions … In the best case scenario, the user is just careless and forgot to close his session before opening a new one from another computer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |