vulnerabilities computer security exploits is governance security holes security consulting hacking it audit traq network security audit cisa information security information forensics