A weakness in the design, implementation, operation or internal control of a process that could
expose the system to adverse threats from threat events
An attack where social engineering techniques are used to masquerade as a trusted party to
obtain important information such as passwords from the victim.
Most OS have two modes of operations - ________ for execution of
privileged instructions for the internal operation of the system and _________
for normal activities.