This documentation will present the basic tenets of a network security engineering process. It will also show that the network security process, as opposed to a point tool, coincides with the creation of new threats.