The University of SydneyPage 54Vulnerabilities in Networks–What makes network vulnerable–Anonymity–Multiplicity of points of attack–Resource sharing–Complexity of system–Uncertain perimeter–Unknown path–Protocol flaws / protocol implementation flaws