Web Authentication Service

The  network restrictions surrounding the web authentication service is one  layer of defense. As was noted, this component is too valuable to trust  to a single defense. Furthermore, authentication requests are tendered  by the least-trusted component in the architecture. That component, HTTP  termination, resides on the least-trusted network. What additional  steps can be taken?
 

Answer  the questions in an APA-formatted paper with in-text citation.  Response should have a minimum of 500 words. Minimum of two references are required.