Network Vulnerabilities

Access by unauthorized individuals

Lack of physical control

General lack of monitoring/auditing features

Identification and control of dial-in-users

Failure to backup critical data

Sensitive to outside interference

Virus infection

Previous slide Next slide Back to first slide View graphic version