A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more. Threats are potentials for vulnerabilities to turn into attacks on computer systems, networks, and more. They can put individuals’ computer systems and business computers at risk, so vulnerabilities have to be fixed so that attackers cannot infiltrate the system and cause damage. Threats can include everything from viruses, trojans, back doors to outright attacks from hackers. Often, the term blended threat is more accurate, as the majority of threats involve multiple exploits. For example, a hacker might use a phishing attack to gain information about a network and break into a network. 3. Exposure
An exposure is a security-related situation, event or fact that may be considered vulnerability by some people but not by others.
An instance of vulnerability in which losses may result from the occurrence of one or more attacks 4. Vulnerability
Vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.[1] To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface. 5. Risk
This relatively new term due to an increasing awareness that information security is simply