Text this: Evaluating the network security by the Read<sub>W</sub>rite transition model