In order to plan and implement appropriate security measures, we first need to be aware of the potential sources of danger:
- Which dangers threaten your LAN or your data?
- Which paths can intruders take to gain access to your network?
Note: Intruding into protected networks is generally referred to as an "attack", so an intruder is also known as an "attacker".