The paths of the attackers

In order to achieve their objectives, the attackers first need a way to access your PCs and data. In principle, the following paths are open to them as long as they are not blocked or protected:

Note: This section concentrates exclusively on the paths through the central Internet connection, the router.
Note: For information on protecting your wireless networks, please refer to the corresponding sections of this Reference Manual or the relevant device documentation.

www.lancom-systems.com

LANCOM Systems GmbH | A Rohde & Schwarz Company | Adenauerstr. 20/B2 | 52146 Wuerselen | Germany | E‑Mail info@lancom.de

LANCOM Logo