Discover new information and insights with the help of IDNLearn.com. Ask any question and get a detailed, reliable answer from our community of experts.

Threats are:_____.
a. Weaknesses in an information system that can lead to a compromise of an asset.
b. Safeguards used to minimize the impact of threats.
c. Capabilities, intentions and attack methods of adversaries to cause harm to assets.
d. Resource or information that is to be protected.