<aside> <img src="/icons/skull-profile_gray.svg" alt="/icons/skull-profile_gray.svg" width="40px" /> Anything that could cause harm, loss, damage, or compromise to our information technology systems is known as a threat
</aside>
<aside> <img src="/icons/cursor_gray.svg" alt="/icons/cursor_gray.svg" width="40px" /> Any weakness in the system design or implementation is known as a vulnerability
</aside>