As we have seen throughout this chapter, security is very important—not only in the digital world, but also in the physical world—to protect an organization's assets from potential intruders. We've discussed various physical controls that focus on detection and prevention. Then, we took a look at various authentication protocols that can be useful on a medium to large network infrastructure.
In the next chapter, we will be covering network troubleshooting methodology.