Cryptography has come a long way over the past years. Breaking into a server from a remote machine is becoming more and more difficult. System administrators make it so that most systems require strong passwords and will reject weak passwords. Current security measures such as Triple DES and DSA do a good job of maintaining the confidentiality, integrity and availability of a given system. These are all examples of how security methods have been built over the years to protect data. However, an often overlooked flaw in the system is that John Doe can easily bypass these thorough security measures by befriending the secretary at the front desk and asking her for her talented help. Yes, years of security research beaten by a friendly smile. |