are tendered by the least-trusted component in the architecture. That component, HTTP termination, resides on

The network restrictions surrounding the web authentication service is one layer of defense. As was noted, this component is too valuable to trust to a single defense. Furthermore, authentication requests are tendered by the least-trusted component in the architecture. That component, HTTP termination, resides on the least-trusted network. What additional steps can be taken? Answer the questions with an APA-formatted paper (Title page, body and references only).  Your response should have a minimum of 500 words.  Count the words only in the body of your response, not the references.