This box represents
all computer resources
subject to attack
The majority of the
attacks (in the red box) are based on low technology which could be used by anyone
These red attacks require the user to have made a security mistake to work
The high technology attacks at the bottom represent weaknesses in the computer code and require more skill to implement