Hello,
I need an example of a insecure network configuration that is may occur in small-business.
For example insecure devices that can be used or how they are connected with each other. Also router/nas/pc configurations. With wireless network it is easy, but i am not familiar with wired networks. Specially I need weak points of a router configurations and weakly designed connections between different devices. Or can anyone refer some publications where these topics are discussed?
I need to design a insecure small-business network configuration for my school project. For example 2 workstations, 1 laptop, NAS, network printer, VoIP telephone etc. After that I need to analyse these weak points.
I need an example of a insecure network configuration that is may occur in small-business.
For example insecure devices that can be used or how they are connected with each other. Also router/nas/pc configurations. With wireless network it is easy, but i am not familiar with wired networks. Specially I need weak points of a router configurations and weakly designed connections between different devices. Or can anyone refer some publications where these topics are discussed?
I need to design a insecure small-business network configuration for my school project. For example 2 workstations, 1 laptop, NAS, network printer, VoIP telephone etc. After that I need to analyse these weak points.