Possible vulnerability assessments need to be prioritized Copyright 2000, Massachusetts Institute of Technology. All rights reserved.