An information security ____________ is a system configuration issue or implementation mistake that allows access to information or capabilities that can be used by an adversary as a stepping-stone into a system or network