Network security is a very real concern for businesses, governments, and individuals alike. Who wants their identity stolen because their credit card info or social security number got leaked over the internet or someone got access to a PIN code or bank account number?
Citation preview
1. 5 Easy Ways To ExploitNetwork Vulnerabilities
2. Network security is a very real concern forbusinesses,
governments, and individuals alike. Who wants their identity stolen
because their credit card info or social security number got leaked
over the internet or someone got access to a PIN code or bank
account number? www.entremt.com
3. This is one of the easiest ways for ahacker to completely
ruin a persons life savings through the internet.
www.entremt.com
4. The Number One Rule: If someone has physical access to a
network or machine, it is no longer secure. www.entremt.com
5. The most common and probably most over- looked network
security risk is something as simple as someone watching you put in
the password to your computer. This could be a friend, a co-worker,
or just someone walking by. Be sure that no one sees this
information. Pay attention to your surroundings.
www.entremt.com
6. Do not leave a cellphone, purse, or brandnew laptop laying
out for someone to grab. www.entremt.com
7. USB devices such as flash drives and portable hard drives
have already undergone government scrutiny within the US
Intelligence community, strict controls placed on devices traveling
in and out of secured areas. www.entremt.com
8. Laptops and other portable systems like cellphones are
similarly controlled within the military environment. Businesses
and offices are often nowhere near this secure, nor are the average
small merchant networks and home networks. www.entremt.com
9. Even with the new security measures used by the Department
of Defense, a huge and well-known security breach still happened in
2010 when a US Army private allegedly leaked a large number of
documents to WikiLeaks, leading to a massive outcry against
apparently lax digital security. www.entremt.com
10. Open wireless access points and wirelessnetworks are often
an easy way into a companys server. www.entremt.com
11. Open home networks often have easy default passwords that
are never changed, and open business network password are usually
set to the name of the business or given to customers for use.
www.entremt.com
12. These are remarkably simpleways to break into
someonespersonal accounts or a stores credit card database.
www.entremt.com
13. Smartphones are one of the most powerful tools for
infecting a network a hacker could ever dream of; its a tiny fully
functional computer in the palm of their hand, complete with a GPS
tracking system built-in that can even be used to physically locate
the network they want to hack into, going back to the Number One
Rule. With this they can not only steal many peoples annuities but
they can also use them with the same device. www.entremt.com
14. In fact, the smartphone actually combines virtually every
aspect of the value of physical security into one convenient
device. You can take high definition pictures and videos with them
and then transmit them out over any of the many data transmission
mediums open on a smartphone. Bluetooth, infrared, 3G, 4G, wifi
and, to the exceptionally skilled hackers, older cellular satellite
networks. www.entremt.com
15. They also have the ability to wire in via USB and move
large chunks of data onto or off of a network. Not to mention the
simple ability to drop a data mining or phishing virus onto the
network and possibly infect every other device on the network.
www.entremt.com
16. The Number One Rule will serve anyone well. Just remember
to always keep your computer locked. Check the passwords on your
home internet connection and into the modem or router itself. Make
sure you monitor your cellphones usage and active connections.
www.entremt.com