Practical Industrial Internet of Things Security
上QQ阅读APP看书,第一时间看更新

Network vulnerability

The following list explains the main considerations regarding network vulnerability:

  • Vulnerable legacy protocols with insufficient security capabilities
  • Weak network security architecture
  • Network device configurations not stored or backed up
  • Unencrypted passwords, lack of password expiration policies
  • Inadequate access controls applied
  • Inadequate physical protection of network equipment
  • Unsecured physical ports
  • Non-critical personnel have access to equipment and network connections
  • Lack of redundancy for critical networks
  • No security perimeter defined, firewalls not used adequately, and control networks used for non-control traffic
  • Lack of integrity checking for communications
  • Inadequate data protection between clients and access points:
Figure 1.11: The flow sequence of threat and risk assessment; Source: Practical IoT Security Book, Packt Publishing