Threats are:_____.
a. Weaknesses in an information system that can lead to a compromise of an asset.
b. Safeguards used to minimize the impact of threats.
c. Capabilities, intentions and attack methods of adversaries to cause harm to assets.
d. Resource or information that is to be protected.