You have been hired as a consultant to secure all network devices for a large firm. 1. Describe the steps you would take to determine the needs of the organization (the discovery of the network devices) 2. Detail the countermeasures (and tools) you would put in place.