![Practical Industrial Internet of Things Security](https://wfqqreader-1252317822.image.myqcloud.com/cover/616/36699616/b_36699616.jpg)
上QQ阅读APP看书,第一时间看更新
Network vulnerability
The following list explains the main considerations regarding network vulnerability:
- Vulnerable legacy protocols with insufficient security capabilities
- Weak network security architecture
- Network device configurations not stored or backed up
- Unencrypted passwords, lack of password expiration policies
- Inadequate access controls applied
- Inadequate physical protection of network equipment
- Unsecured physical ports
- Non-critical personnel have access to equipment and network connections
- Lack of redundancy for critical networks
- No security perimeter defined, firewalls not used adequately, and control networks used for non-control traffic
- Lack of integrity checking for communications
- Inadequate data protection between clients and access points:
![](https://epubservercos.yuewen.com/E70E39/19470390608870106/epubprivate/OEBPS/Images/fbf60739-5d6b-4525-83eb-f6db7f3dc59d.png?sign=1739009953-sWZuDdpUrHDm5zHyThRrwD5m5FMOsdKe-0-6538fd75d17faaf4817f6054f5fd8384)
Figure 1.11: The flow sequence of threat and risk assessment; Source: Practical IoT Security Book, Packt Publishing