As technology advances, the process of conducting a proper vulnerability assessment has become more complex. Namely, a vulnerability assessment is defined as a...