This document discusses conducting a vulnerability assessment. It explains that a vulnerability assessment identifies possible security vulnerabilities in a system. The assessment involves both automated and manual techniques depending on the scope of the organization. The major steps are conducting the assessment, addressing any exposures found, and reporting and remediation. Under conducting the assessment, planning, gathering information, and defining roles and responsibilities are involved. The assessment aims to find and rank vulnerabilities to threats.