Information Security Program Management
A vulnerability is any flaw or weakness that can be exploited and could result in a breach or a violation of a system’s security policy.
Some examples of vulnerabilities include:
– Poorly communicated or implemented policy;
– Inadequately trained personnel; and
– Improperly configured systems or controls.