Identify network vulnerabilities that threat actors use to exploit an organization’s security and implement control measures to avoid such attacks.
Examples: malware, unpatched security vulnerabilities, hidden backdoor programs, superuser or Admin Account privileges