Compromising the Infrastructure A compromise often starts with a weakness in a network, which an attack can leverage. These exploits might involve harmful software, bypassing security measures, or a more sophisticated intrusion. Robust prevention requires constant threat assessment and an security response plan ready to be deployed if a compromise