In line with the IT-base-security, modelling describes an approach that makes use of the modules listed in the basic IT-protection catalogues to emulate the information network of a company/authority. More detailed information on each module and the target objects are gathered in chapter 2.2 of the IT-base security catalogues. Information needed in connection with the prerequisites can be found here, too.