Threat analysis

To plan and to realize suitable measures to guarantee security, it is advisable to know first all possible sources of danger:

Note: We denote the intrusion into protected networks in the following as “attack” according to the general usage, and the intruder thus as “attacker”.