What are the methods to check for vulnerabilities in a network and if they are found what steps to be taken immediately.