Trusted Relationship Attack

T

Organizations that permit access to their network by outside partners are vulnerable to intrusion or use by attackers. In some firms and industries, giving third parties access to network resources throughout a business partnership is customary. Based on a trusted relationship, the third-party partner's legitimate account could be lost or corrupted, leaving the company vulnerable to intrusive intruders.

Previous
Previous

TXT (Text File Document)

Next
Next

Traffic Direction Systems (TDS)