the ones remaining can offer protection. These securities become complete when in hardware and in software. The latter is supposed to be managed updated for it to function well in offer protection from emerging threats. There are various components on network security that work in unison (Bishop
2003:69). This lowers maintenance and improves the level of security.