A single software or security measure is not enough to ensure security in a network. It requires different layers or pieces of the puzzle that need to interlock. Typical measures are, for example, firewalls and intrusion detection systems. A user account alone is not enough either. A user only has as many authorizations as he or she needs to complete his or her tasks (need-to-know principle). These authorizations must be kept up-to-date, as a user can, for example, change departments in the company or leave the company. The authentication method and the fallback method, for example if the user forgets his password, must be chosen appropriately. And so various measures interact to ensure a suitable level of security.