<aside> <img src="/icons/skull-profile_gray.svg" alt="/icons/skull-profile_gray.svg" width="40px" /> Anything that could cause harm, loss, damage, or compromise to our information technology systems is known as a threat

</aside>

This includes:

<aside> <img src="/icons/cursor_gray.svg" alt="/icons/cursor_gray.svg" width="40px" /> Any weakness in the system design or implementation is known as a vulnerability

</aside>

This includes: