Tech Article

Commonly overlooked security hazards

Security expert Dave Piscitello offers tried-and-true practices for identifying and alleviating security risks, and implementing guidelines that will protect your company from the next nasty threat. Here, Dave covers the ten most commonly overlooked security hazards and easy ways to prevent them from placing your network at risk.

  1. Lax policy definition and enforcement – You cannot determine compliance to, enforce, or demand accountability to a policy if you don't have and maintain one.
  2. Overly permissive access policies – Access is one example where more is not better.
  3. Single line of defense - Does your security resemble a soft-boiled egg?
  4. Default installations of software - These are among the most common flaws, and often lead to escalated privilege attacks.
  5. Default and vulnerable configurations - Under most default conditions, devices join networks, even when this is not good for security.
  6. Weak authentication methods - You must apply two or more credentialing criteria.
  7. Inadequate auditing, logging, analysis - Auditing is not an in- depth activity in most organizations, but it should be.
  8. Flawed security processes, unsecured workflows - Mis-configurations commonly expose assets to attack.
  9. Weak security testing and auditing methodologies - Testing and policy changes are related events.
  10. Weak incident response and business continuity plans - Chicken Little is not a role model for a CSO.

Check out Dave's full-length presentation here.


Dave Piscitello is an authority on network security with more than 30 years experience in data networking and telecommunications. Dave is President of Core Competence Inc., founder and program manager of The Internet Security Conference, and chairman of Networld+Interop's Security Conference. Dave has authored books on internetworking and remote access, and regularly publishes articles on a variety of subjects including switched internetworking, ATM and Gigabit Ethernet, Internet security, and virtual private networking.

This was first published in May 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: