Vulnerability Assessment Of The Network Security

1281 Words6 Pages
Introduction According to Kizza (2013), the rapid growth of networking has led to increased security risks. Many of these risks are as result of hacking, improper uses of network resources and network device vulnerabilities. Awareness of the various weaknesses and vulnerabilities is vital to the success of current networks (Kizza, 2013). The network security incidents are increasing at a disturbing rate every year. As the complexity of these threats increases, so do the security measures required to protect networks. Enterprise data center operators and analysts, network administrators as well as other data center experts need to understand the principles of security in order to safely deploy and manage networks today. Vulnerability…show more content…
Table 1 lists security weaknesses found and their description. Table 1 Network Security Weaknesses Vulnerability Description TCP/IP protocol vulnerabilities Some internet protocols such as HTTP, FTP, and ICMP are intrinsically insecure. On the other hand Simple Network Management Protocol (SNMP), Simple Mail Transfer Protocol (SMTP), and SYN floods are closely related to the intrinsic insecure structure design of TCP. The network workstations operating system weaknesses The company uses the Windows network operating systems whose security problem needs address. Network equipment weaknesses The various types of network equipment, such as routers, firewalls, and switches, have security weaknesses that should be recognized and protected against. These weaknesses include the following: Password protection Inadequate authentication Routing protocols Firewall holes Configuration Weaknesses Network administrators and engineers need to fully understand what the configuration vulnerabilities are and correctly configure their computing and network devices. Table 2 lists configuration vulnerabilities
Open Document