Make certain that an idea of separation of responsibilities is applied and logical entry controls and account lockout/disabling controls are in position. Recognize that the 3rd layer from The underside known as Network, but network security does not implement only to this layer. four sorts of cellular security models https://ieeexplore.ieee.org/document/9941250