![]() Step 1- the computer creates its IPv6 address. This is similar to how IPv4 uses an APIPA address. highly desirable target, such as customer credit card information or protected patient data.ĭesigned so that a computer can autoconfigure its own link local IP address without the help of a DHCPv6 server. ![]() Don't use names that identify the location (physical or digital) of sensitive information that might alert an attacker toa. Make sure naming and labeling information is stored behind locked doors and inside secure databases. Think in terms of "top-down" or "outside-in" and be consistent.Ĭonsider any security risks from the details you might include in your naming convention. If your company has national locations or international locations, certain names may need to include codes for continent, country, state, city, and so on. Starting with the building name, then floor, then data room number, then rack number. ![]() Think big-picture-down-to-details when designing device name fields, such as For example, existing acronyms for the various departments in yourĬorporation are more recognizable for employees. Pay attention to any established naming convention already in use by yourĮmployer. Only include fields that are absolutely essential in identifying the device.ĭon't overcomplicate the name with useless or redundant information. Use names that are as descriptive as possible (without giving away too much information to potential hackers). Naming them systematically, and then labeling them with those names.
0 Comments
Leave a Reply. |