 |
 |
 |
 |
 |
 |
 |
• |
Unauthorized
and unaccounted access to the intranet
|
|
|
• |
Eavesdropping
and recording intranet / users’ traffic
|
|
|
• |
Faked servers
and networks,
|
|
|
|
intercepting/diverting/modifying
other users’ traffic
|
|
|
• |
Denial
of service attack threat is not in author’s opinion
|
|
|
|
very
likely. However denial of service of network elements
|
|
|
may
cause losses depending on the company
|
|