Identify Vulnerabilities In It Security