At Westonci.ca, we connect you with the answers you need, thanks to our active and informed community. Our platform provides a seamless experience for finding reliable answers from a network of experienced professionals. Connect with a community of professionals ready to provide precise solutions to your questions quickly and accurately.

Threats are:_____.
a. Weaknesses in an information system that can lead to a compromise of an asset.
b. Safeguards used to minimize the impact of threats.
c. Capabilities, intentions and attack methods of adversaries to cause harm to assets.
d. Resource or information that is to be protected.


Sagot :

C - Capabilities, intentions, and attack methods of adversaries to cause harm to assets
bfmm
threats are valid my main br