An important vulnerable area in the network infrastructure, considering the attacks presented above, is made up of network devices. The targeted devices can be part of any network module and layer, including access level devices, distribution devices, or core equipment. Even though network devices (e.g., routers, switches, or other appliances) have embedded security features, you need to make sure that they are secured from intruders.
The first step is controlling physical access. Critical equipment should be placed in locked rooms that can be accessed only by authorized users, preferable via multiple authentication factors. You also want to make sure . . .
The content below this message is for members only.