< All Topics
Print

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.

Source: NIST SP 800-30 Rev 1

Click to rate this post!
[Total: 0 Average: 0]
Next Vulnerability Assessment
Table of Contents