It is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data. Which of the following terms best matches the definition?
A. Attack
B. Vulnerability
C. Threat
D. Risk
A. Attack
B. Vulnerability
C. Threat
D. Risk