List And Discuss Five Vulnerability Assessment Processes