Inherent risks in
network hardware and design (cont.):
nIf routers are not properly configured to mask internal subnets, users on outside networks can read the private addresses
nModems attached to network devices may be configured to accept incoming calls
nDial-in access servers used by telecommuting or remote staff may not be carefully secured and monitored
nComputers hosting very sensitive data may coexist on the same subnet with computers open to the general public