Respuesta :
Creating awareness among the employees and users about the dangers of social engineering, Limiting the sensitive information ,encrypting sensitive information are the countermeasures a network security architect can set in motion to diminish the threat from network footprinting.
What is networking footprinting?
An ethical hacking approach called "footprinting" is used to gather as much information as possible about a particular target computer system, an infrastructure, and networks in order to spot possibilities to breach them.
What are the different types of threats due to footprinting?
- Footprinting comes in two varieties, which are listed below. Active Footprinting: To perform active footprinting, you must physically interact with the target machine.
- Passive Footprinting: Gathering data on a system that is far away from the attacker is referred to as passive footprinting.
What is the difference between network footprinting and network reconnaissance?
- Reconnaissance, a more comprehensive approach, includes footprinting.
- The information-gathering phase of ethical hacking is known as reconnaissance, during which you gather information about the intended system.
- Anything from network architecture to employee contact information might be included in this data.
Learn more about footprinting
brainly.com/question/14787155
#SPJ4