Step 1: Assess Vulnerability