Some of the servers may contain sensitive information, while others may not. We can generally assume that a server that contains sensitive data is secure against intrusion. However, the other servers that do not contain sensitive data may not be so secure, with a variety of users accessing them.