Implications of Securing Backbone Router Infrastructure