Make sure that an idea of separation of responsibilities is applied and reasonable entry controls and account lockout/disabling controls are in place. See the 3rd layer from the bottom is named Network, but network security doesn't implement only to this layer. Command-line applications and apps are software program tools https://webcastlist.com/story17933253/not-known-facts-about-cyber-attack-model