Planning Security for Data Transmission
Administrators normally configure secure access to data by using NTFS permissions, which are good for securing data from unauthorised users. However, when data is transmitted user across a network, it is open to a number of threats. Hackers can use tools like Network Monitor to view the data and then use other tools to alter it.
You should be familiar with the common vulnerabilities that data is susceptible to and the types of damage that can occur.
|Data Modification||Modifying data in transit|
|Denial of Service (DoS)||Preventing legitimate users from using a system by swamping critical resources, e.g. flooding a computer with TCP synchronisation messages|
|Identity Spoofing||Sending forged emails|
|Network Monitoring||Reading clear text communication|
Next: Encryption Protocols