Skip to main content
. 2020 Jun 30;8:124134–124144. doi: 10.1109/ACCESS.2020.3006172

TABLE 2. Key Security Terms.

Terms Definition
Adversary Individuals or groups with the aim of carrying out inimical activities
Threat Any event or situation with the potential of adversely affecting information system sources
Risk Measure of probability loss resulting from an attack
Attack Threat carried out by an adversary to collect, disrupt, or damage information system sources
Vulnerability Any weakness spot within information system resources that can be exploited by an adversary
Security policy Set of guidelines to maintain the security provisions of an information system resource
Assets Entity to be protected from attacks and includes hardware, software, data, and networks
Countermeasures Approaches to mitigate or prevent attacks to secure assets