Identifying vulnerabilities