The process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures.