Watch this video on YouTube
What term best describes a weakness or gap in a security program that might be exploited by threats?