Tagged: physical security
- This topic has 2 replies, 3 voices, and was last updated 2 months ago by
Chase Cole.
-
AuthorPosts
-
-
November 20, 2023 at 12:04 pm #91934
Manny Varela
KeymasterSuggest at least three different ways networks are vulnerable as well as three different methods or controls that would help curve and protect your network infrastructure.
-
February 8, 2026 at 11:52 pm #112696
Lenay Nichols
ParticipantBecause we live in a world where everything is connected, networks can be definitely be vulnerable in many ways. One vulnerability is weak or as I call them “immature” passwords. If I pick a simple passwords and or reuse that same simple password across multiple accounts, it then becomes easier for someone to guess or obtain them. Another vulnerability is outdated systems. I used to ignore my macOS updates religiously until my uncle, a Senior Software Engineer helped me to understand how unsafe it is. I found out, there really are humans in this world, who are waiting on moments when updates are ignored; because known security holes stay open and attackers often look specifically for those weaknesses. A third vulnerability is unsecured wireless networks. If my Wi-Fi is not configured with strong encryption, unauthorized users could be able to connect or, even intercept data given. A third vulnerability is unsecured wireless networks. If Wi-Fi is not configured with strong encryption, anyone may be able to connect or even intercept data being transmitted. For example, with my Spectrum internet at home, if I never changed the default router password or didn’t use strong encryption like WPA2 or WPA3, someone nearby could possibly connect to my network without me knowing. This can slow down my internet, but more importantly, it could put my personal information at risk.
There are several methods and controls I believe can help reduce these risks and better protect a network. One important control is using strong authentication, including complex passwords vs simple ones and multi factor authentication. This adds another layer of protection and makes it harder for someone to gain access. Another method is regular patching and system updates, which help fix security flaws before they can be exploited. A third control is using firewalls and monitoring tools to filter traffic and alert for suspicious activity.
There is no one solution that protects everything, however, when multiple controls are used together, the network becomes much harder to compromise. -
February 9, 2026 at 10:38 pm #112754
Chase Cole
ParticipantModern networks face many vulnerabilities that can put sensitive data and systems at risk. One major vulnerability is weak passwords or poor authentication practices, which make it easier for attackers to gain unauthorized access. Another common issue is unpatched software. When systems aren’t regularly updated, hackers can exploit known weaknesses. A third vulnerability is phishing attacks, where users are tricked into clicking malicious links or sharing credentials, often without realizing it.
To help protect network infrastructure, several controls can be put in place. First, using strong password policies and multi-factor authentication can greatly reduce the risk of unauthorized access. Second, regular software updates and patch management help close security gaps before attackers can take advantage of them. Finally, employee security awareness training is essential, since educating users about phishing and social engineering can prevent many attacks before they happen.
Overall, while networks will always face threats, combining technical controls with user education can significantly improve security and reduce potential risks.
-
-
AuthorPosts
- You must be logged in to reply to this topic.



