Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.
6.1.1. Threat Terminology
| Term | Definition | Example |
|---|---|---|
| Threat | Potential cause of harm | Hacker, malware, insider |
| Vulnerability | Weakness that can be exploited | Unpatched software, weak password |
| Exploit | Method to leverage vulnerability | Buffer overflow, SQL injection |
| Mitigation | Control to reduce risk | Firewall, ACL, encryption |