Confirmed users
717
edits
Line 36: | Line 36: | ||
*theft of local and network files via file:// and related schemes | *theft of local and network files via file:// and related schemes | ||
*theft of local data via direct access to database or database files | *theft of local data via direct access to database or database files | ||
==== Assets at Risk ==== | |||
* local files, registry entries, etc. | |||
* network files (NFS, SMB) | |||
* intranet servers / services | |||
==Cross-domain Compromise== | ==Cross-domain Compromise== |