Intentional hacking

How should an organization balance access to the documentation against protecting the network from intentional hacking, compromise or damage?

Documenting a network is essential in troubleshooting and support. Explain the security implications in keeping such documentation. How should an organization balance access to the documentation against protecting the network from intentional hacking, compromise or damage?

Scroll to top