using real-life examples of situations explain the vulnerability​