Compromising Confidential Information Comes Under _______
Bug
Threat
Attack
Vulnerability
The answer is (B) Threat.