What are five examples of configuration weaknesses?
(1) Unsecured user accounts (2) System accounts with easil6y guessed passwords (3) Misconfigured internet services (4) Unsecured default settings within products (5) Misconfigured network equipment
(1) Unsecured user accounts (2) System accounts with easil6y guessed passwords (3) Misconfigured internet services (4) Unsecured default settings within products (5) Misconfigured network equipment
(1) TCP/IP Protocol Weaknesses (2) Operating System Weaknesses (3) Network equipment weaknesses
(1) Vulnerability (2) Threats (3) Attack
(1) Technological weaknesses (2) configuration Weaknesses (3) Security Policy Weaknesses
(1) Informs users, staff, and managers of their requirements for protecting information assets (2) Specifies the mechanisms through which these requirements can be met (3) Provides a baseline from which to acquire, configure and audit computer systems for compliance
Answer: completely closed a network from the outside world
(1) Keep networks open to support business requirements (2) Protect private, personal, and business information