logo

Database

Description

Different network units are used to identify the vulnerabilities present in the organization's network.

Impact

- Leverage breaches or security bottlenecks to cause a leakage of information. - Collect security event logs from the internal network.

Recommendation

- Check the network segmentation. - Secure transport encryption is crucial to encrypt the transmission in this layer.

Threat

Anonymous attacker in local network.

Expected Remediation Time

⏱️ 30 minutes.