Types of Vulnerabilities to Network- Exclusive Explanation

Weaknesses of the network which is intrinsic in every network and its device which included routers, switches, servers, desktops and even security devices e.g. firewall etc. Usually, the endpoints, such as servers and desktop computers, are under attack.

Defending the privacy of information, securing from unauthorized access and shielding the network against attacks is the primary issue of network security professionals today. There are three primary vulnerabilities of the network. Which lead to various attacks on the network, including malicious code attacks and network attacks.

Technological

HTTP, ICMP, and FTP are insecure. SMTP and SNMP are related to the insecure structure upon which TCP was designed. The operating system UNIX, Linux Mac OS, Mac OSX, Window has the security problem. The network administrator must consider these problems.

There are various types of network equipment, such as switches, routers, and firewalls. These all have security weaknesses, including password protection, lack of authentication, protocols, and firewall weaknesses that must be acknowledged and protected.

Configuration

The vulnerabilities of the configuration are the following:-

  • The transmission of user account information over an insecure network exposes usernames and passwords.
  • Passwords and usernames, which are quickly figured out, are another common vulnerability.  The system account password must contain an uppercase letter, lowercase letter, figures, and signs.
  • JavaScript in the web browser, enabling attacks by hostile JavaScript when accessing untrusted sites.IIS, FTP, and terminal services also pose problems
  • The difficult setting of devices enables security holes.
  • Misconfiguration of the equipment is also a big security problem.

Security policy

The vulnerabilities of security policy are the following:-

  • The security policy must be available in written form.
  • Default passwords and poorly chosen passwords like dictionary words can easily allow hackers unauthorized access to the network.
  • Unauthorized changes to the hardware and software which not meet the policy can create security risks.