![]() |
The first step a hacker must take is to discover information about your network. Limiting the amount of information that a hacker can acquire makes breaking into your network a tougher task.
A critical step in securing a network is the effective control of information. |