1.4.2 Identifying and preventing vulnerabilities