When an attack using a basic Internet protocol makes the news, it tends to focus on the Web, with either HTTP or DNS in a starring role. But history shows us that other protocols can be used as both weapons and doors for attacking vulnerable organizations. Find out how to safeguard three other network foundation protocols so they don't become weapons or critical vulnerabilities.