3-2 Activity: Network Assessment ApproachDepartment of Technology, Southern New Hampshire UniversityCYB 400: Security Assessment and Auditing 03:46:11 GMT -05:00When assessing a network, there are several things that need to be done to ensure that the assessment is done properly. This is crucial for different reasons. One of the things that you would need to do is identify the hosts, networks, and users by doing some research. By doing this, you would need to find out how the hosts are vulnerable and not protected properly which the organization can take accountability for people, process, and technology. The second method the organization would need to do is scan the vulnerabilities on the network with the Nmap method.Using the Nmap method, would allow the network to scan which would get information on different systems on the network such as computers, printers, firewalls, etc. that would allow the systems to be vulnerable to ensure that the network scan and identify them so that the organization can move on to the next step for the investigation. which would compare the vulnerabilities that were identified, we could compare them to known public and private sources. Any vulnerabilities would be exploited through the penetration