Modify the network diagram to prevent SQL injections. XSS attacks, smurf attacks, e-mail spam, downloaded malware. viruses and ping attacks.
Which of the following should the Information Security Officer be MOST concerned with based on this scenario?