1. What is a vulnerability assessment and what are the steps you take when conducting an assessment?
2.Provide a brief description of the U.S. Department of Defense Rainbow Security criteria? Do you think this model is efficient and effective?
reference and citations needed please write discussion in individual document