Vulnerability Surveys: an Example and some Considerations