Access: It is a security control who are taking permission to view or use the information that is there inside. Asset: It is a data or device or component which secures the data related activities. Attack: It is an attempt to altering or taking the data without any permission. Control safeguard or countermeasure: It is a process of minimizing the attacks by using some techniques is called counter measure. exploit: is an attack on a computer system, especially one that takes advantage of a particular vulnerability that the system offers to intruders Exposure: It is defined as exposing the information without the knowledge of the lead of theat information. Loss: It says when we loose any data this keyword works. protection profile or security posture: it is typically created by a user or user community and provides an implementation independent specification of information assurance security requirements. Risk – The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. sujects and objects: A subject is usually a human user or process running in memory. An object is any resource that exists anywhere a subject can access it (in memory, on disk, across a communications channel, in \"the cloud\", etc.). Threat – Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset. Threat agent: Method used in breaching the security of a facility, operation, or system by exploiting a vulnerability. Vulnerability – Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Solution Access: It is a security control who are taking permission to view or use the information that is there inside. Asset: It is a data or device or component which secures the data related activities. Attack: It is an attempt to altering or taking the data without any permission. Control safeguard or countermeasure: It is a process of minimizing the attacks by using some techniques is called counter measure. exploit: is an attack on a computer system, especially one that takes advantage of a particular vulnerability that the system offers to intruders Exposure: It is defined as exposing the information without the knowledge of the lead of theat information. Loss: It says when we loose any data this keyword works. protection profile or security posture: it is typically created by a user or user community and provides an implementation independent specification of information assurance security requirements. Risk – The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. sujects and objects: A subject is usually a human user or process running in memory. An object is any resource that exists anywhere a subject can access it (in memory, on disk, across a communications channel, in \"the cloud\", etc.). Threat – Anything that can exploit a vulnerability, intentionally or accide.