5 Steps to an Effective Security Assessment