Creating awareness among the employees and users about the dangers of social engineering, Limiting the sensitive information ,encrypting sensitive information are the countermeasures a network security architect can set in motion to diminish the threat from network footprinting.
What is networking footprinting?
An ethical hacking approach called "footprinting" is used to gather as much information as possible about a particular target computer system, an infrastructure, and networks in order to spot possibilities to breach them.
What are the different types of threats due to footprinting?
What is the difference between network footprinting and network reconnaissance?
Learn more about footprinting
brainly.com/question/14787155
#SPJ4