ASSESSING YOUR SECURITY WEAKNESS: A LOOK AT VULNERABILITY ASSESSMENTS AND PENETRATION TESTING