Business information leak - Network Unit
Description
Different network units are used to identify the vulnerabilities present in the organization's network.
Impact
- Leverage breaches or security bottlenecks to cause a leakage of information. - Collect security event logs from the internal network.
Recommendation
- Check the network segmentation. - Secure transport encryption is crucial to encrypt the transmission in this layer.
Threat
Anonymous attacker in local network.
Expected Remediation Time
⏱️ 30 minutes.