
76 Vulnerability ManageMent
Since routing protocols and other network information are also •
visible to the traffic analyzer, it may also be able to map the
topology of the network and use this information to create a
picture of the attack surface of a more complex network. is
type of information can also be obtained by authenticated active
scans and by providing configuration data to specialized tools.
ere are also some interesting disadvantages to this technology:
e device typically must be installed on the switch that car-•
ries the traffic to be monitored. Remote monitoring of a net-
work is often not practical over a busy WAN connection. is ...