6.5 Other Security Considerations
- If root is compromised, all network
access could also be compromised. For example, if a malicious entity
gets root access, it might be able to steal user credentials and
authenticate to the network with those credentials.