kmckee5824 kmckee5824 21-11-2022 Computers and Technology contestada flaws or weaknesses in an information asset, security procedure, design, or control that can be exploited accidentally or on purpose to breach security are known as .