1. Violation of a security policy by a user
2. Disgruntled employee sabotage
3. Download of non-business video using the Internet to an employer-owned computer
4. Malware infection of a user’s laptop
5. Unauthorized physical access to the LAN
6. LAN server operating system vulnerabilities
7. WAN Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks
8. WAN eavesdropping
9. Errors and weaknesses of network router, firewall, and network appliance configuration file
The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to improving information security is to reduce the attack surface of a system or software. By turning off unnecessary functionality, there are fewer security risks. By having less code available to unauthorized actors, there will tend to be fewer failures. Although attack surface reduction helps prevent security failures, it does not mitigate the amount of damage an attacker could inflict once a vulnerability is found.[3] he security implications of having a variety of client platforms are:
1. Violation of a security policy by a user
2. Disgruntled employee sabotage
3. Download of non-business video using the Internet to an employer-owned computer
4. Malware infection of a user’s laptop
5. Unauthorized physical access to the LAN
6. LAN server operating system vulnerabilities
7. WAN Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks
8. WAN eavesdropping
9. Errors and weaknesses of network router, firewall, and network appliance configuration file
The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to