A security vulnerability is
|“||any attribute of hardware, software, process, or procedure that could enable or facilitate the defeat of a security control.||”|
- ↑ Privacy and Civil Liberties Interim Guidelines: Cybersecurity Information Sharing Act of 2015, at 17.
See also Edit
Community content is available under CC-BY-SA unless otherwise noted.