官术网_书友最值得收藏!

Configuration weaknesses 

As a network/system administrator, we should know what configuration weaknesses are and what the corrective measures are for their computing and network devices.

User account information might be transmitted in clear text across the network, exposing usernames and passwords to an intruder. For example, if you manage your devices over Telnet, your username and password can be sniffed. The same thing is also applicable when you manage devices using GUI on HTTP.

Misconfigurations of the devices can cause significant network equipment security problems and open doors for unauthorized access. For example, misconfigured access lists, routing protocols, or SNMP community strings can open large security holes. Misconfigured encryption, lack of encryption, or low encryption ciphers for remote-access controls can also cause significant security issues.

Authentication and authorization is a major concern. If you are interested in knowing who is doing what on a piece of network equipment or system, then you might want to centralize authentication with a single authentication platform by accounting logs enabled to perform an audit regularly.

To reduce the threats to your network, the best option is to disable any unused services on all your networking devices and computing system. For instance, if you have a web server, you should disable FTP, SMTP, and other services. Another example would be if you are managing your devices with SSH, you can disable Telnet, HTTP, and FTP running on the same box.

You should only run the applications that are necessary on a device. All unnecessary applications and services should be disabled, to minimize exposure to the outside world.

主站蜘蛛池模板: 香河县| 宜兴市| 鄄城县| 余姚市| 体育| 永兴县| 甘谷县| 海南省| 伊春市| 水富县| 镇赉县| 大关县| 林口县| 神农架林区| 曲阳县| 闵行区| 九龙县| 包头市| 新郑市| 色达县| 广灵县| 广平县| 郑州市| 文山县| 尼木县| 共和县| 兰坪| 乌兰浩特市| 阆中市| 谢通门县| 塔城市| 搜索| 抚顺县| 响水县| 阿城市| 磐安县| 邵东县| 南丹县| 炉霍县| 伊川县| 长兴县|