- Switch security.
- Encrypting the passwords.
- Telnet Vs SSH.