How To Assess Vulnerabilities