To plan and to realize suitable measures to guarantee security, it is advisable to know first all possible sources of danger:
- Which imminent dangers exist for the own LAN resp. the own data?
- Which are the ways intruders take for the access to your network?
Note: We denote the intrusion into protected networks in the following as “attack”
according to the general usage, and the intruder thus as “attacker”.