Secure networks require hardware (switches, bridges, gateways) located in a secure building, use encryption for wireless transmissions, and maintain strong access credentials (usernames and passwords). Even with these precautions, a would-be hacker could plug a cable directly in to a network switch port, receive an IP address, and capture all non-encrypted traffic on the network. The implementation of the IEEE 802.1X standard protects the network from just such an attack by requiring any connected device to successfully authenticate itself.