Dell E-Port Plus User Manual Page 25

  • Download
  • Add to my manuals
  • Print
  • Page
    / 27
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 24
NCC Group | Page 25 © Copyright 2013 NCC Group
11 Attack mitigation
Another defensive layer is mitigation techniques to prevent implants either being installed in the first
place or to prevent them working when they are installed.
11.1 Active network connection
Recommendation: Only allow one MAC address per switch port - If the switch port into which the
docking station is connected will only allow one MAC address then the implant will not be able to
communicate on the network.
11.2 Passive network sniffing
Recommendation: Ensure that all sensitive network data is encrypted if the data is encrypted then
it doesn’t matter how stealthy the interception technique, as the data will not be easily recoverable.
11.3 Physical security
Recommendation: Physically secure all docking stations to prevent them being swapped for
Trojaned ones
11.4 RF shielding
Recommendation: An RF shield could be developed that fitted over a docking station to prevent
any implant from communicating wirelessly.
Page view 24
1 2 ... 20 21 22 23 24 25 26 27

Comments to this Manuals

No comments