Watch this video on YouTube
Which of the following is the FIRST vulnerability that should be addressed in a distributed system?