At risk of putting words in Banshee's mouth... I'd theorize that such an access point he's describing is more of a system than merely some hardware. Gaining access to that hardware isn't also putting a hacker on a whitelist of SINs authorized to use that hardware, nor is it necessarily true that the hardware even *works* when stolen and employed outside a registered control room, and etc.
Yeah, there would be a lot of dominoes that would have to fall in place ... it's a combination of hardware, credentials, security protocols, and location.
Not something that players should ever be able to attain under normal circumstances but hey it's your campaign... GM's can "Do what we want!"
As an IT professional, I look at it like this. I have all of the sys admin accounts with all of the privileges. I can go into any of my company's servers on our network/s (our "host") and shut things down, change things, whatever. Basically, I'm the spider for my company. I can do all this with ease and can safely ignore all of the banner messages that pop up when I connect to a system that state something to the effect of "This is a private network, unless you are authorized to be on this network any activity performed is a federal crime, blah blah..." I also have special accounts and programs that allow me to access all of this remotely, so I don't even have to be physically located at my office to do my job.
Now if someone wanted to hack my company's systems, they won't have such an easy time accessing them. They can try getting in through our website from anywhere in the world, but most companies put their public facing web sites in what's called a demilitarized zone (DMZ), which is a segregated part of the network on the external side of the firewall. In game, this would be like walking into the "lobby" of the host as a user and buying things. However, to do any useful hacking you'll need to get past the DMZ and through the firewall. This would be kind of like getting admin access. The "noise" level here would represent, to me, the difficulty of getting past a firewall from a remote location without proper authorization, plus any extra baggage you may be employing to cover your tracks. This type of intrusion would likely give you direct access to a data center's core networking equipment. It would be like trying to drop in from the ceiling on wires to avoid the laser "trip wires" to steal the thing.
Now if you were to physically drive to our facility and try to hack directly into our wifi network, you'd likely have a much easier time because once you've broken that network key, you're in. Although in reality, those networks are often segregated themselves into different VLANs (which I would represent as different "rooms" in the host) from the really important stuff... but eh, still easier than hacking through a firewall from a DMZ.
All of that to say, even with today's technology (and my company is at least a decade behind the curve), I have all of the tools I need to perform my job remotely with zero "noise" as long as I'm on a decent internet connection. A SR security spider would have all of this and more, whereas a decker may have the tools, but their routes of ingress largely won't change in 60 years. I have ways of explaining this with my limited knowledge of SR5 and SR6, but that would be for another post.