Wednesday, 2 May 2012

E-Tutorial 2 ( Common Threats to Router and Switch Physical &Mitigation )

Improper and incomplete network device installation is an often-overlooked security threat that, if left unaddressed, can have terrible results. Software-based security measures alone cannot prevent intended or even accidental network damage caused by poor installation.

Hardware threats  
Hardware threats involve threats of physical damage to the router or switch hardware. Mission-critical Cisco network equipment should be located in wiring closets or in computer or telecommunications rooms.
  • The room should not be accessible via a dropped ceiling, raised floor, window, ductwork, or point of entry other than the secured access point.

Electrical threats
Electrical threats include irregular fluctuations in voltage, such as brownouts and voltage spikes, Electrical threats, such as voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss, can be limited.
  • Install backup generator systems for mission-critical supplies.

Environmental threats
Environmental threats include very low or high temperatures, moisture, electrostatic, and magnetic Interference Environmental threats, such as temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry), also require mitigation.
  •  Remove any sources of electrostatic and magnetic interference in the room.

Maintenance threats
Maintenance threats include not having backup parts or components for critical network components; not labeling components and their cabling correctly Maintenance threats include poor handling of key electronic components, electrostatic discharge (ESD), lack of critical spares, poor cabling, poor labeling, and so on. Maintenance-related threats are a broad category that includes many items.
  • Always follow ESD procedures when replacing or working with internal router and switch device components.

4 comments:

  1. This post is very interesting and easy to understand. I have learn a lot about hardware, electrical, environmental and maintenance threats from your post. The examples u gave to stop the threats are quite less. Hence, I would suggest that maybe you can give more examples on how to counterfeit this threats. You can also elaborate more on what the threats is so that readers like myself will be able to understand more. Also, maybe you can add pictures or videos to let readers like myself have a even better and clearer knowledge on what is these threats are all about.

    ReplyDelete
  2. Detailed post on what the particular threat is about and then solution to the threat, also explain what led to these threats from the first paragraph. For the solution part for the hardware threats,I think it will be better if you could elaborate more on how to solve the people from accessing the premises. Example, having magnetic lock doors only authorised personnel able to enter, placing security cameras around and having alarm if anyone tries to force open the security door. But overall, a detailed post with well explaination of what a particular threat is about!

    -Adler

    ReplyDelete
  3. This post is easy to understand and well organized as all the threats are under each individual parts. Examples are also given for each threats to let the readers know more about what it is about. However i think u should include more solutions for each threats this will provide a better understanding of the threats, this would also be useful for those who are finding the solutions.

    ReplyDelete
  4. Wow, what a very well organized and interesting post! You've done it again and again! Very concise and accurate information that you've potrayed through your article, hope that you can release more of such posts in the future, as I'm a huge fan of your blog. You've helped me, a person who is very interested in IT stuffs, but is very unfamiliar with these kind of stuffs. You're the best! You are always helping us understand such IT stuffs, Very detailed post on threat and solution, and you also very clearly explain and elaborate on what led on to such a problem.

    ReplyDelete