21See Chapter 24, “Vulnerability Analysis.”