Vulnerability AssessmentFrom the results of Steps 4, 5, and 6, develop and submit a spreadsheet that includes the following:•characterization of current and emerging vulnerabilities and threats •identification of the attack vector(s) employed against each•your assessment (high, medium, or low) of the impact the vulnerability could have on your organization