Such analysis is vital in the formulation of an effective security policy, which is often one of the most difficult aspects of successfully securing a network. Not only does the creation of a security policy require careful analysis of equipment and protocols, the means of addressing identified vulnerabilities must be balanced against cost and practicality of execution. It is important to remember that a security implementation should not interfere with the operation of personnel or equipment, else it will likely be circumvented by its users [60].