How Can We Identify Vulnerability