3.1.16 - Evaluate the advantages and disadvantages of each method of network security