An attacker can leverage communication channels to initially access a resource, using TT&C or a payload channel, opening a communication link to compromise the victim system. An attacker can perform different actions.
| ID | Mitigation | Description |
|---|---|---|
| M2002 | Authentication | |
| M2004 | CCSDS SDLS Sequence numbers |