Commonly overlooked security hazards

Security expert Dave Piscitello covers the ten most commonly overlooked security hazards and easy ways to prevent them from placing your network at risk.

Security expert Dave Piscitello offers tried-and-true practices for identifying and alleviating security risks, and implementing guidelines that will protect your company from the next nasty threat. Here, Dave covers the ten most commonly overlooked security hazards and easy ways to prevent them from placing your network at risk.

  1. Lax policy definition and enforcement – You cannot determine compliance to, enforce, or demand accountability to a policy if you don't have and maintain one.
  2. Overly permissive access policies – Access is one example where more is not better.
  3. Single line of defense - Does your security resemble a soft-boiled egg?
  4. Default installations of software - These are among the most common flaws, and often lead to escalated privilege attacks.
  5. Default and vulnerable configurations - Under most default conditions, devices join networks, even when this is not good for security.
  6. Weak authentication methods - You must apply two or more credentialing criteria.
  7. Inadequate auditing, logging, analysis - Auditing is not an in- depth activity in most organizations, but it should be.
  8. Flawed security processes, unsecured workflows - Mis-configurations commonly expose assets to attack.
  9. Weak security testing and auditing methodologies - Testing and policy changes are related events.
  10. Weak incident response and business continuity plans - Chicken Little is not a role model for a CSO.

Check out Dave's full-length presentation here.

Dave Piscitello is an authority on network security with more than 30 years experience in data networking and telecommunications. Dave is President of Core Competence Inc., founder and program manager of The Internet Security Conference, and chairman of Networld+Interop's Security Conference. Dave has authored books on internetworking and remote access, and regularly publishes articles on a variety of subjects including switched internetworking, ATM and Gigabit Ethernet, Internet security, and virtual private networking. 

This was last published in May 2005

Dig Deeper on Network Security Monitoring and Analysis

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.