You are a super 1337 hacker who just discovered a vulnerability in an operating system. You do some research and find nothing online regarding this exploit and believe you are the first to find it. What option would be the correct classification of this vulnerability?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |