-
The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability
-
Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset
-
Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset
-
All of the above