Analyzing Security Vulnerabilities And Threats In An Organization: Internet Usage Policy Guidelines