Improper and incomplete network device installation is an
often-overlooked security threat that, if left unaddressed, can have
terrible results. Software-based security measures alone cannot prevent
intended or even accidental network damage caused by poor installation.
Hardware threats
Hardware threats involve threats of physical damage
to the router or switch hardware. Mission-critical Cisco network
equipment should be located in wiring closets or in computer or
telecommunications rooms.
- The room should not be accessible via a dropped ceiling, raised floor, window, ductwork, or point of entry other than the secured access point.
Electrical threats
Electrical threats include irregular fluctuations in
voltage, such as brownouts and voltage spikes, Electrical threats, such
as voltage spikes, insufficient supply voltage (brownouts),
unconditioned power (noise), and total power loss, can be limited.
- Install backup generator systems for mission-critical supplies.
Environmental threats
Environmental threats include very low or high
temperatures, moisture, electrostatic, and magnetic Interference
Environmental threats, such as temperature extremes (too hot or too
cold) or humidity extremes (too wet or too dry), also require
mitigation.
- Remove any sources of electrostatic and magnetic interference in the room.
Maintenance threats
Maintenance threats include not having backup parts or components for
critical network components; not labeling components and their cabling
correctly Maintenance threats include poor handling of key electronic
components, electrostatic discharge (ESD), lack of critical spares, poor
cabling, poor labeling, and so on. Maintenance-related threats are a
broad category that includes many items.
- Always follow ESD procedures when replacing or working with internal router and switch device components.
This post is very interesting and easy to understand. I have learn a lot about hardware, electrical, environmental and maintenance threats from your post. The examples u gave to stop the threats are quite less. Hence, I would suggest that maybe you can give more examples on how to counterfeit this threats. You can also elaborate more on what the threats is so that readers like myself will be able to understand more. Also, maybe you can add pictures or videos to let readers like myself have a even better and clearer knowledge on what is these threats are all about.
ReplyDeleteDetailed post on what the particular threat is about and then solution to the threat, also explain what led to these threats from the first paragraph. For the solution part for the hardware threats,I think it will be better if you could elaborate more on how to solve the people from accessing the premises. Example, having magnetic lock doors only authorised personnel able to enter, placing security cameras around and having alarm if anyone tries to force open the security door. But overall, a detailed post with well explaination of what a particular threat is about!
ReplyDelete-Adler
This post is easy to understand and well organized as all the threats are under each individual parts. Examples are also given for each threats to let the readers know more about what it is about. However i think u should include more solutions for each threats this will provide a better understanding of the threats, this would also be useful for those who are finding the solutions.
ReplyDeleteWow, what a very well organized and interesting post! You've done it again and again! Very concise and accurate information that you've potrayed through your article, hope that you can release more of such posts in the future, as I'm a huge fan of your blog. You've helped me, a person who is very interested in IT stuffs, but is very unfamiliar with these kind of stuffs. You're the best! You are always helping us understand such IT stuffs, Very detailed post on threat and solution, and you also very clearly explain and elaborate on what led on to such a problem.
ReplyDelete