there are certain important changes that require to be considered in the security policy some of which will be mentioned in this paper. This paper aims at assessing the various types of network threats that exist today the Operating system and internet vulnerabilities