9. Security considerations9. Security considerations 9.1. DNS spoofing attacks9.2. Cross-directory attacks9.3. Implementation risks9.4. Persistence risks