Analyzing Information Security Vulnerabilities And Threats And Their Controls