To gain access, an attacker needs to make a connection to the victim's system.
Exploit - software, commands that exploit a vulnerability in a system in order to cause unintended behavior.
Attacks - deliberate attempt by attacker to access, steal, destroy or manipulate information or to disrupt legitimate users access.