This document should discuss the limitations of network defenses. Network defenses are not all foolproof. Please provide perspectives on this by addressing the questions given below.
Determine the limitations of network components such as firewall, anti-virus programs, or authentication mechanisms.
Give perspectives on the sophistication of cyber attacks. Use appropriate examples to substantiate the points made in the document.