Security Policy
Lack of an effective network security policy
As a network security policy directs administrators about how the communication should be facilitated and implemented, this policy serves as the basis for all security efforts. The security policies have weaknesses for a number of reasons, including the following:
Politics. Policy within an organization may cause a lack of consistency within the instructions of security or, worse, a lack of uniform application of security policies. ManySecurity policies are many exceptions to the management and entrepreneurs who become insignificant.
The absence of a written security policy. The absence of a written security policy is essentially the same as not having a policy. Publishing and widely distributing the security policy prevents confusion about the organization.
Lack of continuity. If the personal change, too often, people often care less for the implementation of security policies. If a systemChief leaves a position should be changed, for example, all passwords by the administrator. In an organization that gives administrators the changes several times a year there is a natural reluctance to change the passwords because users soon, because the administrator to know turnover changed.
Lack of planning for disaster recovery. A good disaster recovery plan must be the risks to security breaches. The confusion that can result from a catastrophe that hinderThe success of efforts in forensics, because administrators are not careful in their recovery efforts.
The lack of patch management in security policy. A good security policy is a common hardware and software upgrades. A procedure rules for the implementation of new hardware and software ensures that security will not be forgotten during the implementation of new hardware and software.
Lack of control. Otherwise, check logs and intrusion detection systems (IDS) is many organizationswithout any knowledge that such attacks occur attacks.
The lack of appropriate access controls. Unauthorized access is easier if poorly designed access controls are implemented in the network did. Incorrect password length, password changes often, passwords written on sticky notes and monitors compliance with freely shared passwords are security risks that can lead to security vulnerabilities.
Network configuration weakness
As network devices are increasinglyOverall, the knowledge base, which increases to configure the systems correctly, too. This complexity is more of a problem in smaller organizations where an individual could be responsible for the LAN, WAN, servers and workstations. than in any organization, the network configuration issues and more effective system, the creation and execution of a baseline standard for all configurations. deficiencies in the rule configuration in the following autumnCategories:
Incorrectly configured devices. A simple configuration error can cause serious security problems. If the error is caused by a lack of knowledge or a lack of attention to detail, could be the result of a vulnerability that leaves exposed to the open system or network security threats and potential damage. Some areas of networking, which are more vulnerable to configuration errors are the firewall settings, access lists, Simple Network Management Protocol (SNMP) settings,and routing protocols.
Suspended or weak passwords. Passwords that are too short, easily guessed, or consisting of common words make it easy for an intruder to gain access to corporate resources, networks and the data received. A strong passwords must be at least eight characters and must be uppercase and lowercase letters, numbers and special characters. Furthermore, using the default password or account administrator is a very bad practice. It 'also important thatUsers do not create a password that is too complex to remember. In this scenario, users tend to write their password on a sticky note, defeating the purpose of the password in the first place, and brings it to their monitor. A common method for the creation and the password is "vanity plate" method: you think you used a word or phrase, and converts them into characters on a vanity plate, the change in one or two letters and the replacement of one or for more detailsLetters. Here's an example: In Virginia, for example, an owner of Honda is obviously not like mayonnaise. The owner of the Honda nameplate reads iH8 Mayo. You can drop in an underline and exclamation point and you get IH8_Mayo!. remember not to be smart and easy. Another technology that password is a risk, the use of "joint accounts" shared by many users. joint accounts to avoid accurate accounting of the actions that have been made by specific users and make it impossible to determine (froma rule of law), if a particular user is responsible for a particular action.
Misconfigured Internet services. Java applets, JavaScript, File Transfer Protocol (FTP) Security Settings and Internet Protocol (IP), all in ways that are configured to be safe. Knowing exactly what services are needed and which services will be performed to ensure that Internet services do not create the potential for breaches of network security.
Using the default settings. The default settings are many productsbe designed to support the configuration and placement of production environment. One of the most common default settings, the default password, or guilt, lack of a password. Other examples of standard configuration settings are as follows:
Standard Filter for Cisco VPN 3000 Series Concentrators inadequate protection of the network for use in a production environment.
By default, access to lists of any limit Telnet access to Cisco routers, if Telnet is enabled,must ensure access to only authorized source for mail actions (from the network management).
These are just two examples of defaults as inappropriate for use in production.
Pass CCNA Exam Cisco CCNA Certification Training
Wireless Laser Printer HP Officejet 6500 Wireless Printer All in one
Danos tu comentario
Post a Comment