significant time and effort must be devoted towards protecting computers and services against threats.
This all but demands network administrators keep a close watch on their networks by planning hardware and software resources to carefully keep unauthorized users out.
Such a picture becomes further complicated as more and more innovative technologies become available for business adoption, ultimately creating further network attack vectors.