What Are Information Security Vulnerabilities And How To Overcome Them?