Contact: Evelyn Brown
evelyn.brown@nist.gov
301-975-5661
National Institute of Standards and Technology (NIST)
Caption: The example illustrates three paths that an attacker can take to penetrate the network using FTP server, SSH server or database server.
Credit: NIST
Usage Restrictions: None
Related news release: How secure is your network? NIST model knows