A software, hardware, or procedural weakness that may provide an attacker an open door is called:

A software, hardware, or procedural weakness that may provide an attacker an open door is called:

A software, hardware, or procedural weakness that may provide an attacker an open door is called:

A.
Vulnerability

B.
Capability

C.
Asset

D.
Countermeasure

Explanation:
Part of security management is identifying vulnerabilities within
systems, networks, and companies. A vulnerability is a weakness in a control (or an
absence of a control) that can be taken advantage of by a threat agent. A threat is
a threat agent uncovering the vulnerability and using it.



Leave a Reply 0

Your email address will not be published. Required fields are marked *