How Secure Is Your Network? NIST Model Knows (IMAGE)
Caption
The example illustrates three paths that an attacker can take to penetrate the network using FTP server, SSH server or database server.
Credit
NIST
Usage Restrictions
None
License
Licensed content