• Tools for identifying vulnerabilities.
  • Risk analysis and prioritization techniques.