This documentation discusses the five access points that need to be protected for you to minimize an attacker's entry to each identified access point in the network.