… on the Internet protocols. In addition, third-party software has become a critical element to these organizations and the infrastructure of networks, utilities, and services they rely upon … advantage over its competitors. A vendor CNA must clearly advertise their security point of contact. They must provide the candidate to other affected parties, e.g., other vendors, … Assessment Scanners,” Network Computing, 8 Jan. 2001; http://www.networkcomputing.com/1201/1201f1b2.html (current Mar. 2002). 4. P. Mueller and G. Shipley, “To Catch a Thief,” …