If they know what software your end users or servers run, which include OS Edition and kind, they might enhance the probability of being able to exploit and install a thing inside your network. Spoofing identity: an attacker may well gain usage of the method by pretending to be https://ieeexplore.ieee.org/document/9941250