ledaiminh25981 ledaiminh25981 19-03-2024 Computers and Technology contestada Flaws or weaknesses in an information asset, security procedure, design, or control that can be exploited accidentally or on purpose to breach security are known as_________.