Attacks: Full Compromise
l
Compromise of your
access control device
l
Attacks against
upstream hosts
l
Man-in-the-middle and
redirection against
upstream users