Your network control valves are a huge target for DoS and man-in-the-middle attacks. Here’s how to keep your traffic flowing safely. Routers are a critical element in your enterprise security architecture, and, for more than two years now, the underground hacker community has found them an attractive and surprisingly easy target. Enterprises have hardened their perimeters with VPNs, firewalls and IDSes, but routing protocols, the fundamental element of any corporate network, typically remain untouched. There are basic precautions everyone should take to control physical and logical access to routers (see “Router Security 101”). But these measures target the router itself, leaving the routing protocol communication unprotected, in part because security wasn’t an explicit consideration when routing protocols evolved in the ’80s and ’90s. Many of the access control mechanisms inherent in routing protocols exist to avoid routing loops, not to deter malicious users from injecting false routing information. Full Story
About OODA Analyst
OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.