Watch this video on YouTube
What mechanisms are used to identify vulnerabilities that could be exploited by attackers to compromise a computer system?