Network Vulneratibilies