Identification should include examples of basic security threats and solutions for all networks.