During a routine audit of the network infrastructure, the security team in a financial institution has discovered a number of unprotected endpoints that could potentially be accessed without proper authentication. What is this scenario best described as in the context of Risk Identification?
Risk
Vulnerability
Hazard
Incident