First, a threat and an attack are very different yet similar. A threat is a statement of intentionally inflicting harm on someone or something. While an attack is intentionally inflicting harm on someone or something. Exploits are actions that are fully utilized when accessing and taking advantage of flaws or vulnerabilities in a computer/security system. I do believe that it is ethically acceptable to study and use the various attack methods described in this module. My learning about these methods and how to use them, we learn how attackers/hackers utilize them and how to block their attempts. This experience helps us learn how to better protect our own systems, as well as, the systems of our future employers from possible attacks.