ISSeG logo

 Training and Dissemination web site

FP6 logo

Integrated Site Security for Grids

A project co-funded by EU FP6 programme
Home page

Top Recommendations
Top Threats
Security Checklists
Risk assessment

my Role
my Site
my Community
All Recommendations
All Threats

Security terms



Intrusion (unauthorized network access)  Ref.: T4

What might happen:

Using unauthorized network devices to access the network.


An unauthorized network device (e.g. a wireless access point or ADSL modem) could be attached to your network .
  • Lack of user awareness on what hardware may and may not be used on the network
  • Lack of network supervision and management
  • Weak set up of wireless access points
Local configuration of desktop (or other device) to allow some form of remote gateway access to parts of the internal network. For example, running Windows Terminal Services or a SSH server on hosts.
  • Lack of user awareness on what remote access software may be used on the network


R2, R4, R5, R20, R27, R28, R30, R34, R37, R42, R44, R46, R47, R48, R49, R51, R52, R53, R55, R59, R61

ISSeG Audit Questions:

Please see the ISSeG Risk Assessment questionnaire

Threat group of family:

Compromising    Human    Failure    Environment     Aggression

Copyright (c) Members of the
ISSeG Collaboration
Top of page Home page Information Society and media logo

This is version 5.2 of the website - view release notes
 -view visitor statistics

This page was last modified on28 May 2008 09:26:06 +0200.