|
|
|
Other methods of physical security include controlling and monitoring network traffic and controlling Ethernet Switch access.
- LAN and network components must be configured to protect against security vulnerabilities.
- Well-known network vulnerabilities should be addressed to ensure network security.
|