The first step a hacker must take is to discover information about your network. Limiting the amount of information that a hacker can acquire makes breaking into your network a tougher task.

  • Turn services off to prevent information leaks.
  • Turn off the finger, echo, and character generator service.
  • Block all incoming Simple Network Management Protocol (SNMP) traffic.

A critical step in securing a network is the effective control of information.