The Stages Of Security Analysis
An analysis can determine if your network is protected from unwanted intrusion. To perform a security analysis you must develop a plan, perform the audit, then report your findings.
Site scans: Test port and application layers against internal defenses
Remote Audits: Test external services from attacks (ISP, Hosts, Servers, Etc)
Penetration Tests: This tests the security of your internet, and checks for risks. There should be specific objectives, requirements, and time frames for the test. You should also take care that you do not intentionally damage the systems and data, and notify the site if there is any vulnerabilities.
IP Testing: Email spoofing, and spamming tests.