Tech »  Demystifying vulnerability assessment methodology (Part 1)