Network Attacks, Architecture and Isolation - Effective Network Isolation Part 1