• TCP/IP's source code is available; as a result, many hackers have found security holes in the TCP/IP protocol.
  • Network File System (NFS) and Network Information System (NIS) may allow an attacker root (administrator) access if not configured properly.
  • Operating systems such as MS Windows systems, UNIX, and OS/2 have had their share of security problems.
  • Networking equipment can be threatened by password problems, lack of authentication, routing protocol weaknesses, and holes in Firewalls.