To protect the communication network, electronic, and cyber infrastructure ... measures such as IP monitoring, network firewalls, and other security protocols are in place. These are being ...