Cyber security starts here - attack surface and the kill chain
A network security breach of any kind consists of a series of events that lead to un-authorized access, dissemination of material, or degradation of critical information systems. It is important to consider the behavior and methods that an attacker may employ to breach your network. Attackers will leverage anything that presents itself such as a gullable end user, mis-configuration, or a vulnerable system service that is not patched or secured.