The first step is looking at the gateways as the potential
points through which entry can be gained by the unauthorized or
malicious code. The controls are implemented through a welldesigned
and secure network architecture, choice of protocols
and encryption mechanisms, choice and configuration of
network devices such as routers, and additional defenses