Bad practices when configuring the following aspects of a network can
increase the risk of attack.
A misconfigured network is a primary entry point for unauthorized
users. Leaving a trust-based, open local network vulnerable to the
highly-insecure Internet is much like leaving a door ajar in a
crime-ridden neighborhood — nothing may happen for an arbitrary
amount of time, but eventually someone exploits
the opportunity.
System administrators often fail to realize the importance of
networking hardware in their security schemes. Simple hardware such
as hubs and routers rely on the broadcast or non-switched principle;
that is, whenever a node transmits data across the network to a
recipient node, the hub or router sends a broadcast of the data
packets until the recipient node receives and processes the
data. This method is the most vulnerable to address resolution
protocol (arp) or media access control
(MAC) address spoofing by both outside
intruders and unauthorized users on local hosts.
Another potential networking pitfall is the use of centralized
computing. A common cost-cutting measure for many businesses is to
consolidate all services to a single powerful machine. This can be
convenient as it is easier to manage and costs considerably less
than multiple-server configurations. However, a centralized server
introduces a single point of failure on the network. If the central
server is compromised, it may render the network completely useless
or worse, prone to data manipulation or theft. In these situations,
a central server becomes an open door which allows access to the
entire network.