9.11 Identifying vulnerabilities