Network access

Accessing the network bypasses several security layers.

  • Laws, Buildings, Physical Access Control.

Attackers with access to a network can use it.

  • To obtain information leaked.

  • To obtain information not protected.

  • To enumerate systems and hardware.

  • To discover and exploit vulnerabilities.

Attackers can do it without notice.

  • If controls are not deployed.

  • If controls do not cover the attack path.

Last updated