Priority Action Approach Flow Chart - Security Holes In Corporate Networks Network