Identifies the Most Vulnerable Attack Vectors in Which a Cyber Attack can be Carried out