Guide to SBOM Vulnerability Analysis: Understanding the Basics