Course Content
Address Resolution
Explain how ARP and ND enable communication on a network
0/3
CCNA: Switching, Routing, and Wireless Essentials
The second course in the CCNA curriculum focuses on switching technologies and router operations that support small-to-medium business networks and includes wireless local area networks (WLAN) and security concepts.
0/15
CCNA: Enterprise Networking, Security, and Automation
The third CCNA course describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks – including wide area network (WAN) technologies & quality of service (QoS) mechanisms for secure remote access, along with software-defined networking, virtualization, & automation concepts supporting network digitization.
0/14
CCNA Course
About Lesson

 

Security Threats and Vulnerabilities

Explain why basic security measures are necessary on network devices.

Types of Threats

  • Attacks on a network can be devastating and can result in a loss of time and money due to damage, or theft of important information or assets. Intruders can gain access to a network through software vulnerabilities, hardware attacks, or through guessing someone’s username and password. Intruders who gain access by modifying software or exploiting software vulnerabilities are called threat actors.
  • After the threat actor gains access to the network, four types of threats may arise:
    • Information Theft
    • Data Loss and manipulation
    • Identity Theft
    • Disruption of Service

Types of Vulnerabilities

  • Vulnerability is the degree of weakness in a network or a device.
  • Some degree of vulnerability is inherent in routers, switches, desktops, servers, and even security devices.
  • Typically, the network devices under attack are the endpoints, such as servers and desktop computers.
  • There are three primary vulnerabilities or weaknesses:
    • Technological Vulnerabilities might include TCP/IP Protocol weaknesses, Operating System Weaknesses, and Network Equipment weaknesses.
    • Configuration Vulnerabilities might include unsecured user accounts, system accounts with easily guessed passwords, misconfigured internet services, unsecure default settings, and misconfigured network equipment.
    • Security Policy Vulnerabilities might include lack of a written security policy, politics, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes not following policy, and a nonexistent disaster recovery plan.
  • All three of these sources of vulnerabilities can leave a network or device open to various attacks, including malicious code attacks and network attacks.

Physical Security

  • If network resources can be physically compromised, a threat actor can deny the use of network resources.
  • The four classes of physical threats are as follows:
    • Hardware threats – This includes physical damage to servers, routers, switches, cabling plant, and workstations.
    • Environmental threats – This includes temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
    • Electrical threats – This includes voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
    • Maintenance threats – This includes poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling.
  • A good plan for physical security must be created and implemented to address these issues.

 

 

Other related topics

 

Topic Title Topic Objective
Security Threats and Vulnerabilities Explain why basic security measures are necessary on network devices.
Network Attacks Identify security vulnerabilities.
Network Attack Mitigation Identify general mitigation techniques.
Device Security Configure network devices with device hardening features to mitigate security threats.

Other useful information

Join the conversation