Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.
5.1.4. Security Terminology and Compliance
Key Terms:
| Term | Definition |
|---|---|
| Vulnerability | A weakness that could be exploited |
| Threat | Potential source of harm (attacker, disaster) |
| Exploit | Method of taking advantage of vulnerability |
| Risk | Probability of threat exploiting vulnerability × impact |
Risk Management:
- Avoidance: Eliminate the risk (don't do the risky activity)
- Mitigation: Reduce impact or likelihood (implement controls)
- Acceptance: Acknowledge and live with the risk
- Transfer: Shift risk to another party (insurance, outsourcing)
Compliance Frameworks:
- PCI DSS: Payment card industry security standards
- HIPAA: Healthcare data protection
- GDPR: EU data privacy regulations
Written byAlvin Varughese
Founder•15 professional certifications