vulnerability scanning tools / Internet access / internal networks / public web servers / control communications / Internet connection / information system media / communications sessions / outbound communications / information technology products / e.g. virus protection software / appropriate auditing / audit tools / internet connectivity / information system / organization use appropriate vulnerability scanning tools / electronic information systems / /