Problem
Describe methods of a network security assessment. Why is a post-mortem assessment review important? What is the purpose of penetration testing? In responses to your peers, please discuss network security best practices and the importance of physical security.