The Vulnerability Of Network Infrastructure Vulnerabilities

1436 Words6 Pages
Security services are an integral part of any network design. Assessing the vulnerability of network infrastructure to disruptive events is recognized as an important component of network planning and analysis. This section provides an overview of common network infrastructure vulnerabilities, essential network security concepts analysis and present. It illustrates the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. This paper also describes a comprehensive security policy for a company including ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information. Network infrastructure vulnerabilities…show more content…
Networks are typically plagued by three primary vulnerabilities: Technology vulnerabilities, Configuration vulnerabilities, and Security policy vulnerabilities. Technological vulnerabilities: Various types of network equipment, such as routers, firewalls, and switches, have security weaknesses that must be recognized and protected against. These weaknesses include the following: Password protection, Lack of authentication, Routing protocols, and Firewall holes. Configuration Weaknesses: Misconfigurations of the equipment itself can cause significant network equipment security problems. For example, misconfigured access lists, routing protocols, or SNMP community strings can open up large security holes. Misconfigured or lack of encryption and remote-access controls can also cause significant security issues, as can the practice of leaving ports open on a switch (which could allow the introduction of “comparative company” computing equipment). Security Measures Security measures are safeguard that addresses a threat and mitigates risk. Network security means protecting network infrastructure and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Security management is a process of defining the security controls in order to protect the network infrastructure as well as information assets. There two general security measures when designing a network infrastructure. First, the infrastructure
Open Document