Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

5.1.4. Security Terminology and Compliance

Key Terms:
TermDefinition
VulnerabilityA weakness that could be exploited
ThreatPotential source of harm (attacker, disaster)
ExploitMethod of taking advantage of vulnerability
RiskProbability of threat exploiting vulnerability × impact
Risk Management:
  • Avoidance: Eliminate the risk (don't do the risky activity)
  • Mitigation: Reduce impact or likelihood (implement controls)
  • Acceptance: Acknowledge and live with the risk
  • Transfer: Shift risk to another party (insurance, outsourcing)
Compliance Frameworks:
  • PCI DSS: Payment card industry security standards
  • HIPAA: Healthcare data protection
  • GDPR: EU data privacy regulations
Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications