week 10

K1.10 The potential vulnerabilities in critical systems:

A vulnerability is a weakness in a system that can be exploited by a threat actor (such as a hacker) or caused by human error, poor design, or lack of security controls.

In critical systems—such as servers, network infrastructure, and secure workstations—vulnerabilities can lead to data loss, downtime, and serious security breaches.

Below are some of the key vulnerabilities found in organisations.


Unauthorised Access to Network Infrastructure

What it is:

When people (inside or outside the organisation) gain unauthorised access to core components like switches, routers, firewalls, or servers.

Why it’s a risk:

  • Allows attackers to monitor, manipulate, or redirect network traffic

  • May expose internal systems to external attacks

Example:

  • Weak router admin password is guessed, giving full control to an attacker

Mitigation:

  • Use strong passwords

  • Apply network segmentation

  • Limit access using Access Control Lists (ACLs)


Unauthorised Physical Access to Network Ports

What it is:

When someone physically connects a device (e.g. laptop or USB stick) to network ports without permission.

Why it’s a risk:

  • Attackers could connect to the network bypassing firewalls

  • Could be used to install malware or spyware

Example:

  • An unauthorised visitor plugs into a network socket in a meeting room

Mitigation:

  • Lock unused ports

  • Use port security settings on switches

  • Implement visitor access policies


Single Point of Failure

What it is:

A single component (like a server or router) that, if it fails, causes the entire system or service to stop working.

Why it’s a risk:

  • A single failure can lead to major downtime

  • Makes the organisation less resilient

Example:

  • Only one database server handles all staff records – if it crashes, the service goes down

Mitigation:

  • Use redundancy (backup systems)

  • Set up load balancing and failover systems


System Failure

What it is:

A system crash or malfunction caused by hardware issues, software bugs, or poor maintenance.

Why it’s a risk:

  • Could result in data loss, service interruption, or security exposure

Example:

  • An old, unpatched server operating system crashes and cannot reboot

Mitigation:

  • Keep systems updated and patched

  • Perform regular health checks and monitoring

  • Maintain service-level agreements (SLAs) for critical hardware


Open Port Access

What it is:

When input/output ports on devices (e.g. USB, CD drives, or wireless) are unrestricted, allowing for unauthorised data transfer or malware infection.

Why it’s a risk:

  • Can be used to exfiltrate data, introduce viruses, or bypass network restrictions

Includes:

Type Risk Example
USB Ports Staff plug in unverified USB drives carrying malware or keyloggers
CD/DVD Drives Optical media used to load unauthorised software or steal files
Wireless Networks Poorly secured Wi-Fi allows external attackers to access the network remotely

 

Mitigation:

  • Disable unused ports

  • Use endpoint security tools

  • Apply device control policies

  • Ensure Wi-Fi networks use strong encryption (e.g. WPA3)

 

Secure the Network – Spot the Vulnerability

Scenario:
You’ve been asked to assess the computer network at a local business. During your visit, you notice:

- A USB stick left in a PC
- An unlocked server cabinet
- Only one file server being used
- Guest Wi-Fi with no password

Task:
1. Identify the vulnerabilities
2. Explain the risks for each
3. Recommend one solution per vulnerability

Extension:
Create a network security checklist that an IT team could use during a weekly inspection.

 

 


Last Updated
2025-07-14 08:33:57

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage




Links to Learning Outcomes

Links to Assessment criteria

 


Files that support this week


| | | | |
Week 9
Prev
Week 10
Prev
Week 11
Prev

Next