An assessment of vulnerability is done to determine a system's risk position based on its IT vulnerability. The threat is defined by the combination of vulnerabilities, threats, and asset worth. One example of a risk is an employee who is unhappy trying to gain access that is not authorized into the computer system. A vulnerability…