This report analyzes the network of a mobile application development company and assesses the threats and risks to the underlying infrastructure. It includes a network diagram, identifies threats to components, lists security controls, and discusses risks and security controls. The report concludes with observations on security threats and risks.