There are 5 steps in this phase. The first step starts with searching active hosts and scanning detected vulnerability of each active host. Both NetClarity and Nessus have ability to specify MAC Address and operating system of the target but it is system administrator’s responsibility to separate which one is server or client. Let’s specify H as number of active hosts. Subscript s refers to “server” and crefers to “client”. Thus,Hsrepresents number of detected active server and Hcrepresents number of detected active client. The next step is to find the