Attack surface  

The set of ways in which an adversary can enter a system and potentially cause damage. An information system’s characteristics that permit an adversary to probe, attack, or maintain presence in the information system.

Technology Elevated