Configuration Vulnerabilities/Weakness

Configuration Vulnerabilities/Weakness

A computer network has many types of configuration but every configuration of network has weaknesses. Network administrations have the responsibilities to design a secure network that protects the computer network from any type of attacks. But even after secure configurations, there still exists some weaknesses in the network configurations. Some of the major configuration vulnerabilities are as follows:


Unsecured User and System Accounts: During the configuration of the computer network, there is a possibility that the user account information might transmit across the network. Exposing usernames and passwords can become one of the major security threats. Network administrators have the responsibility to change the default passwords of major devices regularly because the hackers can guess the password of a poor system information easily and can damage it.

Misconfigured TAP Ports, Internet Services and Devices: The misconfigured TCP ports, Internet services and network devices can cause vulnerabilities. The lack of clarity is one of the reasons that lead to misconfiguration. Also, some scripts such as Java script, VB script and enabling of remote services during the configurations can damage the security of the computer network. In addition, misconfiguration of the routing protocols, SNMP community strings and access lists may also create different security problems. Further ahead, the lack of encryption and remote access controls can also cause security issues.

Unsecured Default Settings: The unsecured default setting of the devices such as default passwords is available to the public. In addition, these default permissions can give the scope of attacks in computer networks. The unencrypted channels and clear text credentials during the transmission also causes the security issues.


Please follow and like us:

Leave a Reply

Your email address will not be published. Required fields are marked *