官术网_书友最值得收藏!

Configuration weaknesses 

As a network/system administrator, we should know what configuration weaknesses are and what the corrective measures are for their computing and network devices.

User account information might be transmitted in clear text across the network, exposing usernames and passwords to an intruder. For example, if you manage your devices over Telnet, your username and password can be sniffed. The same thing is also applicable when you manage devices using GUI on HTTP.

Misconfigurations of the devices can cause significant network equipment security problems and open doors for unauthorized access. For example, misconfigured access lists, routing protocols, or SNMP community strings can open large security holes. Misconfigured encryption, lack of encryption, or low encryption ciphers for remote-access controls can also cause significant security issues.

Authentication and authorization is a major concern. If you are interested in knowing who is doing what on a piece of network equipment or system, then you might want to centralize authentication with a single authentication platform by accounting logs enabled to perform an audit regularly.

To reduce the threats to your network, the best option is to disable any unused services on all your networking devices and computing system. For instance, if you have a web server, you should disable FTP, SMTP, and other services. Another example would be if you are managing your devices with SSH, you can disable Telnet, HTTP, and FTP running on the same box.

You should only run the applications that are necessary on a device. All unnecessary applications and services should be disabled, to minimize exposure to the outside world.

主站蜘蛛池模板: 眉山市| 方城县| 绥化市| 临朐县| 桐城市| 区。| 抚顺县| 汉沽区| 财经| 嘉黎县| 太保市| 平果县| 弥勒县| 卢龙县| 古浪县| 北海市| 定襄县| 碌曲县| 平舆县| 家居| 桐庐县| 阿尔山市| 九龙城区| 新晃| 沁阳市| 东安县| 西青区| 五大连池市| 龙陵县| 雷山县| 泽普县| 巴马| 巨鹿县| 金乡县| 庆安县| 威信县| 德钦县| 龙胜| 瓦房店市| 洛阳市| 肃北|