Identify Potential Threats And Vulnerabilities