BackClick here to view the resource directly.

Instructions: Read pp.783-6, sections 19.1.2 through 19.2, to understand the criteria for selection, identification, and assessment of "key vulnerabilities." (Approximately 30 minutes)