• Authentication
  • Access Control
  • Port, Service and Protocol Security
  • Wireless Network Security
  • Patches and Updates
  • Mitigation Techniques