Select a routing protocol that interests you, whether it's RIP vs. OSPF, EIGRP, BGP, or a different routing protocol. Research any security issues associated with this routing protocol.
- Describe the modular approach to security design. Find a recent computing security breach in the news and present how a modular approach may have been used to prevent the security breach.