How To Identify Network Security Vulnerabilities