Vulnerability AssessmentFrom the results of Steps 4, 5, and 6, develop and submit a spreadsheet that includes the following:•characterization of current and emerging vulnerabilities and threats •identification of the attack vector(s) employed against each•your assessment (high, medium, or low) of the impact the vulnerability could have on your organizationMake sure to address security architectures, including components, specifications, guidelines, standards, technologies, etc. Also consider international threats and attack vectors. This assessment will be included in your final presentation.