Vulnerabilities can arise when software implementations for identity and access management do not strictly preserve the dependencies between steps in the underlying business processes. Hackers can exploit these vulnerabilities by causing steps to occur out of order. Which of the following terms refers to a specific software issue that causes such vulnerabilities?
a) multi-threading
b) race condition
c) crashes
d) buffer overflow