Actions to mitigate security risks in telecommunication networks

Actions to mitigate security risks in telecommunication networks 

Actions to mitigate security risks in communication networks is a constant concern.

telecommunication networkstelecommunication networks

Actions to mitigate security risks in communication networks is a constant concern not only of people in the IT department but also the Director levels as there is a latent risk of theft or loss of information

 

There is no foolproof security, but actions that can help are as follows:

1.

– Vulnerabilities assessment
 Usually hackers have automated tools to discover vulnerabilities, as a legal user there are tools from authorized companies to  monitor your internet links from the hacker point of view to show the vulnerabilities, as how they can be exploited and a possible solution for close the doors of attack

 

2.-Denial of Service Attacks
This type of attack is the most common you can reduce the risk of being discovered by automated hacker tools with special configuration on your router, for example
a) Setting up the router to appear as not existing. Very often ping is closed improperly responding as “timeout” but the kind of response tells the remote host exists but is configured to not answer the ping
b) Inspection of packets by the router

 

3.-installation of measurement equipment
there are tools to discover what kind of traffic travels over the business internet links in order to detect any abnormal behavior as shown
a) Total Traffic
b) Breakdown by application showing ports in use and consumption
c) consumption by local and remote IP address

 

4.-Close unnecessary applications
with the information from above you can use access lists on the routers to close applications that are not business and block unknown host or network.

In the customer’s network is possible to discover abnormal behaviors such as high traffic on unknown applications from local and corporate PC.

5. – Constant review of software
It is important to have network equipment with the latest manufacturer software, because it constantly releases software to mitigate vulnerabilities

 

6.-Count with upgraded antivirus and antispyware for all local and corporate network

There are a number of risks that can be exploited also considering the ease of getting information on the Internet and schools as they teach to be certified ethical hacker, often used this knowledge to the theft and network damage, it is best to get expert help in security to help you reduce your risks and protect information properly. 

  11 agosto 2010   1. Tecnología