 
                            Failing to close files when they are no longer needed may allow attackers to manipulate system resources. This phenomenon is typically referred to as file descriptor leakage. Depending on the system in use, the standard function fopen() may open 
Non-Compliant Code Example: fopen()
Compliant Solution
Non-Compliant Code Example: open()
Compliant Solution
Risk Assessment
Failing to properly close open files may allow unintended access to system resources.