What are the vulnerabilities in the telecommunications network?
What are the factors that produce vulnerabilities in the telecommunications network?
Vulnerabilities are seen as latent risk exposure that can be exploited by a threat as viruses, hackers, employees, Spyware, etc.
The typical vulnerabilities found in any network are:
1.
-Protection Strategy
most companies focus their efforts on technology to protect from outside world, but at 70% statistically threats come from inside people who know localization of the critical information that keeps the organization running.
2. – Inappropriate investment
the level of investment in security should be proportional to the value of information that keeps the business operating.
3. – Indifference
Organizations tend to postpone action to protect themselves from threats both internally and externally because they think several reasons
a) It is very remote that happen to us
b) Nothing happened before
c) There is no budget
d) No time or staff
The effect arises when the network is down impacting business considering the prestigious analysis company gartner.com companies typically lose business for 42,000 dlls per hour of down time plus adding the investment necessary to fix the problem, the final loss is much more than working in a proactive way
The risks have evolved and now, companies must address denial of service attacks and blended threats, for example the integration of automated tools hack, unauthorized access to systems and ability to identify and exploit vulnerabilities of operating systems or applications to damage computing resources
Specifically, in denial of service attacks, computer equipment is no longer a target, is the connectivity links through which may affect the entire network environment, for example saturating the bandwidth or alter the company’s Web Site. It is thus clear that the risks are on the network, not the PC.
It takes a great experience to take effective action to protect business resources, for this reason it is highly recommended you obtain advice from an expert in network security

