CONSIDERATIONS TO KNOW ABOUT SMARTPHONE VULNERABILITY ASSESSMENT