What is the term for the exploitation of software vulnerabilities to gain unauthorized access or control over a system?
Firewall
Phishing
Exploit
Encryption