Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

6.1.1. Threat Terminology

TermDefinitionExample
ThreatPotential cause of harmHacker, malware, insider
VulnerabilityWeakness that can be exploitedUnpatched software, weak password
ExploitMethod to leverage vulnerabilityBuffer overflow, SQL injection
MitigationControl to reduce riskFirewall, ACL, encryption