5.1. Intruders Visual Notes | Information Security BIM | TU | TABFlux