Security
Vulnerability
IT risk management
Attack tree
CVSS
Threat model
Attack
Application security
Exploit
Computer security
Computer network security
Cyberwarfare