Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 2

Infraestructura Apps

y
or
P

ct
e

HC
all
s

as
er

re
er
ifi

N
itc

ew

-D
ab
ut

Di
rv

LA
W
Sw
Ro

t
Se

S
Fir

e
Da

DN

tiv
Ac
Weak Password
Shared Password
Malicious insider
Misused Trust Relationship
Man in the Middle
Phising
Social Engineering
Spam
Stolen Certificates
Physical Theft
Misconfiguration
Denial of Service
Unpatched Vulnerability
Customer Data Loss
Data Destruction
Zero Day Vulnerability
Da
t ab
as
e
DN
S -D
HC
P
Ac
tiv
e
Di
re
ct
or
y
M
ail
an
d
m
es
s ag
in
gS
er
EndPoints

ve
r

Pr
in
te
rs
De
v ice
s M
ob
ile
Cloud

W
in
do

s us
er
s

Cl
ou
d
St
or
a ge

You might also like