Browsing: how to identify vulnerabilities in information security