In order to achieve their objectives, the attackers first need a way to access your PCs and data. In principle, the following paths are open to them as long as they are not blocked or protected:
- Via the central Internet connection, e.g. via a router
- Via decentralized connections to the Internet, e.g. using modems on individual PCs or mobile phones connected to laptops
- Via wireless networks operating to supplement wired networks
Note: This section concentrates exclusively on the paths through the central Internet connection, the router.
Note: For information on protecting your wireless networks, please refer to the corresponding sections of this Reference Manual or the relevant device documentation.