The set of ways in which an adversary can enter a system and potentially cause damage. An information system’s characteristics that permit an adversary to probe, attack, or maintain presence in the information system.
The set of ways in which an adversary can enter a system and potentially cause damage. An information system’s characteristics that permit an adversary to probe, attack, or maintain presence in the information system.