Jump to content

Template:Security guidelines: Difference between revisions

no edit summary
No edit summary
No edit summary
Line 142: Line 142:
       <td> By router admin password</td>
       <td> By router admin password</td>
<td>Many manufacturers are implementing UART interfaces on their devices. If this interface is not password protected, security of the device may be compromised. If malicious 3rd party gains physical access to the device it will have full control of the router via UART interface, this is a reason why our devices have password protected UART interfaces.</td>
<td>Many manufacturers are implementing UART interfaces on their devices. If this interface is not password protected, security of the device may be compromised. If malicious 3rd party gains physical access to the device it will have full control of the router via UART interface, this is a reason why our devices have password protected UART interfaces.</td>
    </tr>
</table>
123
<table class="wikitable">
    <tr>
      <td rowspan="6">Port Scan Prevention</td>
      <td>Port Scan</td>
      <td>Off</td>
<td>A port scan is a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port.</td>
    </tr>
    <tr>
      <td>SYN-FIN attack</td>
      <td>Off</td>
<td>An attacker may send TCP/IP packets with the SYN and FIN TCP/IP flags set to a target system, ranging across all ports, to find open TCP/IP ports for further attacks. The target system will drop packets which are destined to open ports and send back RST/ACK packets for closed ports. The attacker may gather information from the system responses.</td>
     </tr>
     </tr>
</table>
</table>
0

edits