Which of the following best describes the term 'vulnerability' in the context of network security?
Any potential cause of an unwanted impact to a system or organization
A method by which someone takes advantage of a vulnerability
A weakness in a system that can be exploited
The potential for loss or damage when a threat exploits a vulnerability