<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: network threat in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/network-threat/m-p/4431892#M1082169</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1223030"&gt;@00u17ua1bnBUwRHhF5d7&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&lt;SPAN&gt;this involves Arp spoofing, communication altering, device tempering&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;These three events means the attacker has physical access to the network.&amp;nbsp; Router, switches, servers, etc.&amp;nbsp; It is "game over man.&amp;nbsp; Game over."&lt;/P&gt;</description>
    <pubDate>Mon, 12 Jul 2021 22:42:18 GMT</pubDate>
    <dc:creator>Leo Laohoo</dc:creator>
    <dc:date>2021-07-12T22:42:18Z</dc:date>
    <item>
      <title>network threat</title>
      <link>https://community.cisco.com/t5/network-security/network-threat/m-p/4431889#M1082168</link>
      <description>&lt;P&gt;How do you deal with network related cyber threat, this involves Arp spoofing, communication altering, device tempering. very high level of methods are used, I been told they have bigger connection and never speak with police, can someone help. Are these threats are real? Are they capable of doing the things they said. How big and powerful are these organized network. Any suggestion or help would be appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jul 2021 22:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-threat/m-p/4431889#M1082168</guid>
      <dc:creator>00u17ua1bnBUwRHhF5d7</dc:creator>
      <dc:date>2021-07-12T22:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: network threat</title>
      <link>https://community.cisco.com/t5/network-security/network-threat/m-p/4431892#M1082169</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1223030"&gt;@00u17ua1bnBUwRHhF5d7&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&lt;SPAN&gt;this involves Arp spoofing, communication altering, device tempering&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;These three events means the attacker has physical access to the network.&amp;nbsp; Router, switches, servers, etc.&amp;nbsp; It is "game over man.&amp;nbsp; Game over."&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jul 2021 22:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-threat/m-p/4431892#M1082169</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2021-07-12T22:42:18Z</dc:date>
    </item>
  </channel>
</rss>

