Describe the difference between passive and active security threats? What are the fundamental requirements addressed by computer security? Based on the network vulnerability results, provide your recommendation regarding enhanced network security for your organization.