Since the network operator controls both ingress point (e.g., the CMTS) of the EAS data, as well as the egress point (e.g., cable modem), appropriate security measures such as firewalls and DOCSIS traffic-based security can be taken to prevent ???hijacking???, hacking or other surreptitious activities aimed at corrupting or misusing the data or communication channel(s).