Loading: How to Develop an IT Vulnerability Assessment