This question concerns Networking Devices and Networking Security - A group of e
ID: 3598613 • Letter: T
Question
This question concerns Networking Devices and Networking Security - A group of executives are coming in to decide if they would like to merge with your company, but they are concerned about the security of your networking services. Your boss is giving a presentation to the board of directors and this group of potential investors on the vulnerabilities of networks. Because there are so many potential vulnerabilities in a network, he needs you to give him a detailed explanation of just one vulnerability, how a cyber criminal may exploit that vulnerability, and how the company could address it.
What is the common potential vulnerability in a network that you would choose to give him an explanation of? Please include information as how a cyber criminal might exploit the vulnerability and how the company should address it? Keep in mind these prompts while giving your answer:
What policies should be in place to help reduce risk? How do you control the integration of personal and work technology? How does wireless technology increase risk?
Explanation / Answer
Misconfigured firewall rulebases.
Network security has lot of potential vulnerability in any network, it is a highest challenge for any companies to overcome, else the attackers will easily exploit the network. Out of these potential vulnerabilities, "Mis configured firewall rulebases" are preferred choice for most of the attackers to exploit networks. So it is necessary to close this loop hole to avoid the intruders from penetrating the network.
Generally the very worst assumption in any network is ,"everything is well with firewall" because its working fine.While going through firewall rulebases, which has never been analyzed then it will be a dangerous configuration weakness, it will be door for any unauthorized access in web environment.
Even the cyber criminals will make it as direct access , sometimes indirect access from other network segments like Wi-Fi , else section of a network that has not been used for long days.
Example Scenario:
If a firewall allows more ports to open than necessary , else allowing unauthorized hosts to establish connection to server, that will result in cyber criminals to get the control over any network. Consider a situation like, a database server requires a open port to serve the query from the web servers.That may neglect to stop connection to the open port. Using this situation, with the help of brute force technique any attacker may exploit the target network.
Points to consider to avoid this network exploitation.
1. Need to evaluate the rules and policies of any firewall at regular interval.
2. To have a routine check on open ports , to confirm whether it is necessary now to be in open condition, else to close it.
3. Using multilevel authorization for securing the network.
Through Wi-Fi (wireless network) the intruders will try to enter into network, if the firewall is not configured well, which is easy way for the exploiters to get through the network.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.