EXAMPLES: 2.6 Finding adequate solutions is a challenge when it comes to recording, identifying and preventing <information attacks> concerning a network system, given the constant configuration changes, the variety of network protocols and services provided and developed and the extremely complex, asynchronous nature of attacks (16).