Lecture02. Cyberdefense – end devices