What is the importance of network infrastructure devices

 Network infrastructure devices are often easy targets for attackers. Once installed, many network devices are not maintained at the same security level as general-purpose desktops and servers. The following factors can also contribute to the vulnerability of network devices:


Few network devices—especially small office/home office and residential-class routers—run antivirus, integrity-maintenance, and other security tools that help protect general-purpose hosts.
Manufacturers build and distribute these network devices with exploitable services, which are enabled for ease of installation, operation, and maintenance.
Owners and operators of network devices often do not change vendor default settings, harden them for operations, or perform regular patching.
Internet service providers may not replace equipment on a customer’s property once the equipment is no longer supported by the manufacturer or vendor.
Owners and operators often overlook network devices when they investigate, look for intruders, and restore general-purpose hosts after cyber intrusions.
How can you improve the security of network infrastructure devices?
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and network administrators to implement the following recommendations to better secure their network infrastructure:


  • Segment and segregate networks and functions.
  • Limit unnecessary lateral communications.
  • Harden network devices.
  • Secure access to infrastructure devices.
  • Perform out-of-band (OoB) network management.
  • Validate integrity of hardware and software.
More about : level 3 network

Comments

  1. High quality AWS Solutions Architect Associate training and certification courses in Melbourne, Sydney, Brisbane, Adelaide and Online.
    AWS Solutions Architect Certification

    ReplyDelete

Post a Comment

Popular posts from this blog

How to Invert Colors on Microsoft Office Picture Manager

Performance evaluation for proactive network management

NetAdmins versus SysAdmins: What’s the Difference?