Over the years I’ve written a number of articles attempting to either define, or differentiate between, various terms used within information security.
Here there are in one place.
The Difference Between a Vulnerability Assessment and a Penetration Test
The Difference Between Threats, Threat Actors, Vulnerabilities, and Risks
When to Use Vulnerability Assessments, Pentesting, Red Teams, and Bug Bounties