Skip to main content

Planning Security for Data Transmission

Administrators normally configure secure access to data by using NTFS permissions, which are good for securing data from unauthorised users. However, when data is transmitted user across a network, it is open to a number of threats. Hackers can use tools like Network Monitor to view the data and then use other tools to alter it.

You should be familiar with the common vulnerabilities that data is susceptible to and the types of damage that can occur.

Vulnerability Damage
Data Modification Modifying data in transit
Denial of Service (DoS) Preventing legitimate users from using a system by swamping critical resources, e.g. flooding a computer with TCP synchronisation messages
Identity Spoofing Sending forged emails
Network Monitoring Reading clear text communication


Next: Encryption Protocols