Drag and drop the security concept from the left onto the example of that concept on the right.
Select and Place:
threat
|
vulnerability
|
risk
|
exploit
|
|
anything that can exploit a weakness that was not mitigated
|
threat
|
a gap in security or software that can be utilized by threats
|
vulnerability
|
possibility for loss and damage of an asset or information
|
risk
|
taking advantage of a software flaw to compromise a resource
|
exploit
|
|
WARNING
the answers are mixed, do not specify in the comment number or the letter of the answer
please write answer#A instead A, answer#B instead B...