I am learning about network documentation for the first time and have come across the following statement:
Undocumented networks might not be protected and can be used to support insider attacks.
According to this website, network documentation is a way of representing the organisation of your network.
Why then might an undocumented network be unprotected and more susceptible to insider attacks?
I would have thought that, since a documented network represents the organisation of the network, it would be easier to attack a documented network.
I would appreciate help understanding the statement above.