A software, hardware, or procedural weakness that may provide an attacker an open door is called:
A.
Vulnerability
B.
Capability
C.
Asset
D.
Countermeasure
Explanation:
Part of security management is identifying vulnerabilities within
systems, networks, and companies. A vulnerability is a weakness in a control (or an
absence of a control) that can be taken advantage of by a threat agent. A threat is
a threat agent uncovering the vulnerability and using it.