Which option is the term for a weakness in a system or its design that can be exploited by a threat
Which option is the term for a weakness in a system or its design that can be exploited by a threat
Which option is the term for a weakness in a system or its design that can be exploited by a threat