jsinjar8191 jsinjar8191 18-04-2018 Computers and Technology contestada The collection of all possible vulnerabilities that could provide unauthorized access to computer resources is called the: