The document outlines the concepts of threats, assets, attacks, vulnerabilities, and risks within an information security context. A threat is identified as a potential cause of harm to an asset, while vulnerabilities represent weaknesses that can be exploited by these threats. Risk is described as the intersection of assets, threats, and vulnerabilities, highlighting the potential for loss or damage when a threat exploits a vulnerability.
Related topics: