Security
Completing the Vulnerability Assessment
So, that management device inside the storage network, what does it run? Is it connected to a network? Is it just the PSTN, or is it Ethernet, or both? Is it managed? Who manages it? What services does it run? Why isn't it hardened? Is access restricted? How is it restricted? Who is authorized, and how is authorization determined?
2:07:35 PM # Google It!
categories: Security, System Administration