System restarts during Downtime to implement new configurations. Attackers often use this window to exploit security lapses.