Hardware threats refers involving threats of physical damage to the router or switch hardware. Mission-critical Cisco network equipment should be located in wiring closets or in computer or telecommunications rooms that meet these minimum requirements:
The room must be locked with only authorized personnel allowed access.
The room
should not be accessible via a dropped ceiling, raised floor, window, duct-work,
or point of entry other than the secured access point.
If
possible, use electronic access control with all entry attempts logged by
security systems and monitored by security personnel.
If
possible, security personnel should monitor activity via security cameras with
automatic recording.
Environmental
threats refers to moisture being wet or dry or temperature being very high
or low. Environmental threats such as extreme temperature or extreme humidity
will require mitigation.
Electrical threats
refers to irregular fluctuations in voltage, such as brownouts and voltage
spikes, Electrical threats, such as voltage spikes, insufficient supply voltage
(brownouts), unconditioned power (noise), and total power loss.
This can be solve by:
Installing backup generator systems for
mission-critical supplies.
Install
redundant power supplies on critical devices.
Maintenance
threats include not having backup parts or components for critical network
components; not labeling components and their cabling correctly Maintenance
threats include poor handling of key electronic components, electrostatic
discharge (ESD), lack of critical spares, poor cabling, poor labeling, and so
on.
To
solve this issue, we can Clearly label all equipment cabling and secure the
cabling to equipment racks to prevent accidental damage, disconnection, or
incorrect termination. Always follow ESD procedures when replacing or working
with internal router and switch device components. Maintain a stock of critical
spares for emergency use.
This post is generally very well done and easily explained. I have learnt many different kinds of threats and the ways to mitigate them. One example I learnt was "The room must be locked with only authorized personnel allowed access.
ReplyDeleteThe room should not be accessible via a dropped ceiling, raised floor, window, duct-work, or point of entry other than the secured access point.
If possible, use electronic access control with all entry attempts logged by security systems and monitored by security personnel.
If possible, security personnel should monitor activity via security cameras with automatic recording."
Although the information regarding Environmental Threats may be a bit too little. It would be better for further elaboration to be done. (: