Information Systems

In 250 words or more, answer the following.

Evaluate the types of Vulnerability assessments, select one that you might use, and explain why it is important.

Of the top nine areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached that way.