An IT vulnerability is a software or hardware state that, if exploited, would allow dangerous and unauthorized access to your infrastructure
vulnerabilty
any possible exploit of a vulnerability.
threat
Which of the following are among the primary goals of well-designed information security protocols?