| |
Network Vulnerabilities
| Access by unauthorized individuals
|
| Lack of physical control
|
| General lack of monitoring/auditing features
|
| Identification and control of dial-in-users
|
| Failure to backup critical data
|
| Sensitive to outside interference
|
| Virus infection
|
|