The set of ways in which an adversary can enter a system and potentially cause damage.

An information system's characteristics that permit an adversary to probe, attack, or maintain presence in the information system.

Loading conversations.
Similar or Related Terms
Statistics
190
Characters
34
Words
28.51
Flesch Reading Ease
17.7
Flesch Kincaid Grade