8 Steps for Vulnerability Assessment