Vulnerability Analysis Chart - How To Perform It Security Risk Assessment