. . "online entity (for purposes of this example, attacking computer 106) attempts to gain access to computer 100 via a modem or other communication interface device (process step 302)." . .