P) Network attack vectors & mitigation