Network access
Last updated
Last updated
Accessing the network bypasses several security layers.
Laws, Buildings, Physical Access Control.
Attackers with access to a network can use it.
To obtain information leaked.
To obtain information not protected.
To enumerate systems and hardware.
To discover and exploit vulnerabilities.
Attackers can do it without notice.
If controls are not deployed.
If controls do not cover the attack path.