A large automated and distributed network previously compromised computers that can be
simultaneously controlled to launch large-scale attacks such as denial of service.
A weakness in the design, implementation, operation or internal control of a process that could
expose the system to adverse threats from threat events