Some risks
associated with people (cont.):
nNetwork administrators overlooking security flaws in topology or hardware configuration
nNetwork administrators overlooking security flaws in operating system or application configuration
nLack of proper documentation and communication of security policies
nDishonest or disgruntled employees abusing their file and access rights
nAn unusual computer or terminal being left logged into the network