This happens when a system, such as a Web server, database server or file server on one network segment, is attacked and a conduit of sorts is created via the storage back end to adjacent network segments, essentially bypassing any firewall protection.