In the question above, the violation that configured the interfaces is the protection. It is because in times of violation occurrences, unknown sources shows up without any notification, this means that the protection of the device or computer is not protected and this is the interfaces that has been breached. Such occurrences can happen when the computer or device's protection has been violated and pass through.