What are vulnerabilities? Vulnerabilities are a weakness in a computer construction or software construction which allows an attacker to gain control or access to network or a computer/s.

On the website Network world I come across an article about Top 10 vulnerabilities inside the network, written in November 2010. I am going to make a little litotes based of this article.

1.       USB thumb drives  

·         Using this strategy it’s possible to infect a network from inside a firewall, to prevent this it’s possible to change auto-run on the computer for the device or disable using USB.

2.       Laptop and netbooks:

·         Today laptop and netbooks that companies are using can contain sensitive information.  And if the computer get lost or stolen this data can get to wrong hands. To reduce data lost or get in the wrong hands it is smart to make a regular backup of the files in the computer and Implement an encrypted file system for sensitive data

3.      Wireless access points:

·          Wireless APs are naturally insecure, regardless if encryption is used or not. Strong, mixed passwords should be used and changed on a fairly frequent basis.

4.       Miscellaneous USB devices:

·         Like digital cameras, MP3 players, etc The fact is, if an endpoint can read and execute data from the device, it can pose just as much of a threat as a thumb drive. There for its smart to make a policy that all devises should be scan before it is permit to connect.

5.       Inside connections:

·         The human factor, it’s hard to prevent that persons try to make changes or destroy software inside the company. But we can make it harder for them. Password to computers (servers) should be change regularly and employers should only have access to system that is necessary for them to use.

6.       The Trojan human:

·         Attackers who visit sites disguised as employee personnel or contractors. Reminders should be sent to employees about authorizing third parties.

7.       Optical media: CDs, DVDs, etc.

·         Gain access the classified information he had authorized credentials for and store the data on the “music” CDs in encrypted archives. To prevent this its smart to implement same rules as using USB devise.

8.       Hindsight is 20/20:

·         Who is watching you when you log into your desktop? One of the treats its when one it’s watching you using your password locking into your computer or using your credit card. To prevent: Observe your surroundings.

9.       Smartphones and other digital devices:

·         In phones today it’s possible to take a lock on your email, internet bank and etc. To prevent: Use more secured devise to do so.

10.   E-mail:

·         An E-mail can contain confidential information can easily be forwarded, viruses, Trojan, links that has security premonitory for the users. To prevent: Make an inside policy of what to do if an e-mail containing links or file.

What can we do to minimize the vulnerabilities of our network?

Here are some basic rules that can be used!

  • Keep software and security patches up to date
  • Configure security settings for operating system, internet browser and security software
  • Develop personal security policies for online behavior
  • Install a proactive security solution to block threats targeting vulnerabilities

But after all common sense is the best security of all.

 By : Alexander Ólafsson


This entry was posted in IT Security, Week 36. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s