| |
Network Vulnerabilities
 | Access by unauthorized individuals
|
 | Lack of physical control
|
 | General lack of monitoring/auditing features
|
 | Identification and control of dial-in-users
|
 | Failure to backup critical data
|
 | Sensitive to outside interference
|
 | Virus infection
|
|