1)Explain in your own words what type of information can be obtained by using network scanning techniques and why it is an important intelligence gathering process.
2)Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up
3)Explain in your own words what some of the challenges are with the Change Management Process for IT security.