This document discusses defending a DHCP infrastructure against cyber attacks. It describes how DHCP works to assign IP addresses via a client-server model. It then outlines common attacks like DHCP spoofing and starvation. It recommends deploying DHCP Snooping on switches to validate DHCP messages and filter invalid ones to prevent attacks and ensure correct network configuration.