Different roles, different points If you want todestroy a networking system. how to locate your targets? If you want to guard a networking system how to assign your safety measures?Different roles, different points • If you want to ‘destroy’ a networking system, how to locate your targets? • If you want to ‘guard’ a networking system, how to assign your safety measures? 3