Watch this video on YouTube
What is the primary purpose of conducting a vulnerability analysis on network systems?