Network security, as a technology with the fastest rate of development and application in all branches of business, requires adequate protection to provide high security. The aim of the safety analysis applied on an information system is to identify and evaluate threats, vulnerabilities and safety characteristics. To cope up the mode of the network security management in the research and application field of computer science is still a challenge. Many literatures [1-4] research shows that the objective of network security management is optimized for network security. In fact, Optimization involves Operations Research techniques that have been used for years in designing networks, transportation system, and manufacturing systems also can be applied to optimizing network security. The objective of this problem is to minimize the Tost Cost of Ownership is the sum of capital and operating over the life of the network security assets [1].