Disclosed is a network hardening mechanism. The mechanism: generates a
dependency graph from a multitude of exploits; constructs a goal
conditions expression which may then be used to determine set(s) of safe
network configurations. A subset of these safe network configuration sets
may then be selected for implementation using hardening costs as a
criterion.