Network Documentation: Demon or Hero?

 Documenting a network provides valuable information about a network’s structure and vulnerabilities. While documentation is meant to be used to secure the network, malicious hackers can perform social engineering attacks on unsuspecting employees. Access to network documentation should be closely monitored with access controls. Companies can encrypt sensitive documents and limit their ability to be printed or stored off-site. Attackers using dangerous tools like port scanners can identify weaknesses in the network. They can perform DoS attacks that overwhelm a network and may even shut an entire system down to the public. When a system is shut down, normal business operations cannot continue, and companies lose thousands of dollars when customers can no longer make a purchase. Attackers can perform dangerous MitM attacks where they eavesdrop and intercept sensitive communication between networks. Hackers can even set up pretend networks through rouge access points that appear legitimate to users and intercept network traffic! Network documentation is essential to network security. Companies must invest in training employees about dangerous social engineering attacks and must take precautions to secure network passwords, encrypt sensitive information, and regularly perform network checks to ensure network safety.


Comments

Popular posts from this blog

SalonAboutBeauty: Less Integration for Consistent Styling Across Components

Why “Human Error” Is Usually a System Design Problem

Challenges in Prosecuting Deep Web and Darknet Crimes: The Case of Ross Ulbricht and the Silk Road