[index] [text page] [<<start] [<prev] [next>] [last>>]
Page 5: Who Uses Covert Channels? (cont)

Page 5

  
  Who Uses Covert Channels? (cont)
  Internal users who 
  Want to use forbidden protocols:
  SSH to personal mail machine
  Access P2P networks
  Instant Messaging
  Want to have non-malicious back door access:
  Work from home via inbound SSH tunnel.
  Access company-internal websites from home.
  Want to avoid having management/etc see their actions:
  Access questionable content from work
  Applying for job with competitors
  Corporate 'spies'

Copyright 2003, Bri Hatch of Onsight, Inc.

Presented at SecureWorld Expo, 2003.

Presentation created using vim and MagicPoint.