16
5 Easy Ways To Exploit Network Vulnerabilities

5 Easy Ways To Exploit Network Vulnerabilities

Embed Size (px)

DESCRIPTION

Network security is a very real concern for businesses, governments, and individuals alike. Who wants their identity stolen because their credit card info or social security number got leaked over the internet or someone got access to a PIN code or bank account number?

Citation preview

  • 1. 5 Easy Ways To ExploitNetwork Vulnerabilities
  • 2. Network security is a very real concern forbusinesses, governments, and individuals alike. Who wants their identity stolen because their credit card info or social security number got leaked over the internet or someone got access to a PIN code or bank account number? www.entremt.com
  • 3. This is one of the easiest ways for ahacker to completely ruin a persons life savings through the internet. www.entremt.com
  • 4. The Number One Rule: If someone has physical access to a network or machine, it is no longer secure. www.entremt.com
  • 5. The most common and probably most over- looked network security risk is something as simple as someone watching you put in the password to your computer. This could be a friend, a co-worker, or just someone walking by. Be sure that no one sees this information. Pay attention to your surroundings. www.entremt.com
  • 6. Do not leave a cellphone, purse, or brandnew laptop laying out for someone to grab. www.entremt.com
  • 7. USB devices such as flash drives and portable hard drives have already undergone government scrutiny within the US Intelligence community, strict controls placed on devices traveling in and out of secured areas. www.entremt.com
  • 8. Laptops and other portable systems like cellphones are similarly controlled within the military environment. Businesses and offices are often nowhere near this secure, nor are the average small merchant networks and home networks. www.entremt.com
  • 9. Even with the new security measures used by the Department of Defense, a huge and well-known security breach still happened in 2010 when a US Army private allegedly leaked a large number of documents to WikiLeaks, leading to a massive outcry against apparently lax digital security. www.entremt.com
  • 10. Open wireless access points and wirelessnetworks are often an easy way into a companys server. www.entremt.com
  • 11. Open home networks often have easy default passwords that are never changed, and open business network password are usually set to the name of the business or given to customers for use. www.entremt.com
  • 12. These are remarkably simpleways to break into someonespersonal accounts or a stores credit card database. www.entremt.com
  • 13. Smartphones are one of the most powerful tools for infecting a network a hacker could ever dream of; its a tiny fully functional computer in the palm of their hand, complete with a GPS tracking system built-in that can even be used to physically locate the network they want to hack into, going back to the Number One Rule. With this they can not only steal many peoples annuities but they can also use them with the same device. www.entremt.com
  • 14. In fact, the smartphone actually combines virtually every aspect of the value of physical security into one convenient device. You can take high definition pictures and videos with them and then transmit them out over any of the many data transmission mediums open on a smartphone. Bluetooth, infrared, 3G, 4G, wifi and, to the exceptionally skilled hackers, older cellular satellite networks. www.entremt.com
  • 15. They also have the ability to wire in via USB and move large chunks of data onto or off of a network. Not to mention the simple ability to drop a data mining or phishing virus onto the network and possibly infect every other device on the network. www.entremt.com
  • 16. The Number One Rule will serve anyone well. Just remember to always keep your computer locked. Check the passwords on your home internet connection and into the modem or router itself. Make sure you monitor your cellphones usage and active connections. www.entremt.com