Skip to content
Search
  • Home
  • Courses
  • Certifications
  • About Us
  • Log In
Cyber-Recon
Search
  • Home
  • Courses
  • Certifications
  • About Us
  • Log In
Cyber-Recon
Share This
Tweet

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. -NIST.gov

Related Articles:
  • Install and configure network components, both hardware and software-based, to support organizational security
  • Introduction to the RMF
  • Glossary: Buffer Overflow
« Back to Glossary Index

Join Cyber-Recon Today!

Your Home For Cyber-Security and Information Technology Training

Start Learning
Copyright © 2025 Cyber-Recon
Powered by Cyber-Recon