Watching someone do a great impersonation of a famous person can be very amusing. However, when it comes to network devices, impersonation can be all too easy to accomplish, and difficult to detect. The principles of Information Security should be instituted at every point along the path from a...