Network (vulnerabilities)
Definition:
A network consists of two or more computers / devices that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked wireless, through cables, telephone lines, radio waves, satellites, or infrared light beams. In a broader aspect we can define a network as every kind of machinery, that is linked to each other, something that can grow into huge proportions in modern times as a result of "the internet of things (IoT)".See also: network attacks.
We can define 3 types of network vulnerabilities: hardware-based, software-based and user-based. Below a list of possible network vulnerabilities:
Hardware-based:
- Hardware Issues: improperly managed and unpatched or unknown devices.
- Intruders: an unauthorized person gaining access to a device can install malware by copying it from a USB-device or external prearranged location.
- Laptops and smartphones form a huge risk: not only can they get exposed to malware, but they also can get lost or stolen.
- Firewall Issues: misconfiguration, no secundairy firewall where there should be one etc. Lots of organizations make use of web application firewalls (WAFs) for these reasons.
- Wi-fi: a poorly secured Wi-Fi network lets nearby devices connect, getting past the firewall.
- IoT Devices: many devices for the Internet of Things are cheaply made and have inadequate security.
- Unauthorized Devices: devices of which the IT department doesn't know about.
Software-based:
- Outdated and self-written software that can't be patched easily: apply tight access control to limit the dangers.
- Unmanaged software: as for unknown devices, attached to the system by users, they can also have software on them that you don't know about.
- Misconfigurated and default software: every network has it's own needs and threats, standard software needs to be well configurated and often modified to level-up security.
- No intranet: in lots of organizations employees use functions that do not need access to the internet, use an intranet to set up a separate network for it.
User-based:
- Password-management: users often tend to choose weak passwords and/or store these passwords on a piece of paper in drawer: inform them well and bring password managers under their attention.
- No multi-factor authentication: multi-factor authentication brings an extra security layer, be sure to make this obligatory.
- Social engineering: phishing, scam phone-calls, malicious websites etc.: just like at home, users are just as vulnerable to being tricked in your organization; training, informing and testing are good practises to mitigate these risks.
- Least risk policy: give only access to the software-parts that every specific user needs to do his job, global access brings extra security-risks.
Network-worm: see Worm