FAQ

Do any areas of the network not require authentication to access?

Are there any areas of the network that don't currently require authentication to access?

About the author
Russ Rogers is an information security expert and author of Nessus Network Auditing, 2nd Edition. Russ is currently a penetration tester for the federal government.

Networks have two types of boundaries: physical and operational. Physically, we consider a boundary to be a port on a wall or a perimeter router. Operational boundaries are the best place to look if we want to find out whether or not authentication should be required. For example, a large number of organizations allow free, or open, network access to visitors or customers. These areas of the network are often operationally separate from the parts of the network where the work is done. In cases like this, the open network doesn't require any form of authentication. As an example, consider the free wireless access at coffee shops, airports and cafes.


This was first published in September 2008

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: