Knowledge

Threat (computer security)

Source πŸ“

358:
with the potential to cause harm to a system in the form of destruction, disclosure, modification or data, and/or denial of service. 3. Any circumstance or event with the potential to cause harm to the ADP system or activity in the form of destruction, disclosure, and modification of data, or denial of service. A threat is a potential for harm. The presence of a threat does not mean that it will necessarily cause actual harm. Threats exist because of the very existence of the system or activity and not because of any specific weakness. For example, the threat of fire exists at all facilities regardless of the amount of fire protection available. 4. Types of computer systems related adverse events (i.e., perils) that may result in losses. Examples are flooding, sabotage and fraud. 5. An assertion primarily concerning entities of the external environment (agents); we say that an agent (or class of agents) poses a threat to one or more assets; we write: T(e;i) where: e is an external entity; i is an internal entity or an empty set. 6. An undesirable occurrence that might be anticipated but is not the result of a conscious act or decision. In threat analysis, a threat is defined as an ordered pair, <peril; asset category>, suggesting the nature of these occurrences but not the details (details are specific to events). 7. The potential violation of security. 8. A set of properties of a specific external entity (which may be either an individual or class of entities) that, in union with a set of properties of a specific internal entity, implies a risk (according to a body of knowledge).
832:
illicitly accessed, there is no direct productivity loss. Similarly, the destruction of a highly sensitive asset that does not play a critical role in productivity would not directly result in a significant productivity loss. Yet that same asset, if disclosed, can result in significant loss of competitive advantage or reputation, and generate legal costs. The point is that it is the combination of the asset and type of action against the asset that determines the fundamental nature and degree of loss. Which action(s) a threat agent takes will be driven primarily by that agent's motive (e.g., financial gain, revenge, recreation, etc.) and the nature of the asset. For example, a threat agent bent on financial gain is less likely to destroy a critical server than they are to steal an easily
896:
terrorist threat community would depend in large part on the characteristics of your organization relative to the motives, intents, and capabilities of the terrorists. Is the organization closely affiliated with ideology that conflicts with known, active terrorist groups? Does the organization represent a high profile, high impact target? Is the organization a soft target? How does the organization compare with other potential targets? If the organization were to come under attack, what components of the organization would be likely targets? For example, how likely is it that terrorists would target the company information or systems?
418: 371: 79: 2671: 1729: 38: 126: 1672:(UEBA) to inform the analyst of potential risks. The analyst then investigates these potential risks, tracking suspicious behaviour in the network. Thus hunting is an iterative process, meaning that it must be continuously carried out in a loop, beginning with a hypothesis. There are three types of hypotheses: 986:
is a process that helps organizations identify and prioritize potential threats to their systems. It involves analyzing the system's architecture, identifying potential threats, and prioritizing them based on their impact and likelihood. By using threat modeling, organizations can develop a proactive
831:
Each of these actions affects different assets differently, which drives the degree and nature of loss. For example, the potential for productivity loss resulting from a destroyed or stolen asset depends upon how critical that asset is to the organization's productivity. If a critical asset is simply
357:
The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. Categorize and classify threats as follows: Categories Classes Human Intentional Unintentional Environmental Natural Fabricated 2. Any circumstance or event
1663:
Threat hunting can be a manual process, in which a security analyst sifts through various data information using their knowledge and familiarity with the network to create hypotheses about potential threats. To be even more effective and efficient, however, threat hunting can be partially automated,
1716:
To protect yourself from computer threats, it's essential to keep your software up-to-date, use strong and unique passwords, and be cautious when clicking on links or downloading attachments. Additionally, using antivirus software and regularly backing up your data can help mitigate the impact of a
806:
Individuals within a threat population; Practically anyone and anything can, under the right circumstances, be a threat agent – the well-intentioned, but inept, computer operator who trashes a daily batch job by typing the wrong command, the regulator performing an audit, or the squirrel that chews
339:
threats are anything (e.g., object, substance, human, etc.) that are capable of acting against an asset in a manner that can result in harm. A tornado is a threat, as is a flood, as is a hacker. The key consideration is that threats apply the force (water, wind, exploit code, etc.) against an asset
1004:
is the practice of collecting and analyzing information about potential and current threats to an organization. This information can include indicators of compromise, attack techniques, and threat actor profiles. By using threat intelligence, organizations can develop a better understanding of the
272:
Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or
1703:
has conducted research and surveys on the effectiveness of threat hunting to track and disrupt cyber adversaries as early in their process as possible. According to a survey performed in 2019, "61% report at least an 11% measurable improvement in their overall security posture" and 23.6% of the
602:
Recent trends in computer threats show an increase in ransomware attacks, supply chain attacks, and fileless malware. Ransomware attacks involve the encryption of a victim's files and a demand for payment to restore access. Supply chain attacks target the weakest links in a supply chain to gain
895:
Subsets of the overall threat agent population that share key characteristics. The notion of threat communities is a powerful tool for understanding who and what we’re up against as we try to manage risk. For example, the probability that an organization would be subject to an attack from the
1610:
Threat management involves a wide variety of threats including physical threats like flood and fire. While ISMS risk assessment process does incorporate threat management for cyber threats such as remote buffer overflows the risk assessment process doesn't include processes such as threat
1614:
Cyber threat management (CTM) is emerging as the best practice for managing cyber threats beyond the basic risk assessment found in ISMS. It enables early identification of threats, data-driven situational awareness, accurate decision-making, and timely threat mitigating actions.
881:
Threat sources are those who wish a compromise to occur. It is a term used to distinguish them from threat agents/actors who are those who carry out the attack and who may be commissioned or persuaded by the threat source to knowingly or unknowingly carry out the attack.
1695:
The analyst researches their hypothesis by going through vast amounts of data about the network. The results are then stored so that they can be used to improve the automated portion of the detection system and to serve as a foundation for future hypotheses.
1232:
In context of masquerade, any hardware, firmware, or software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious
859:
Organized Crime and Criminals: Criminals target information that is of value to them, such as bank accounts, credit cards or intellectual property that can be converted into money. Criminals will often make use of insiders to help
1129:
A threat action whereby an unauthorized entity indirectly accesses sensitive data (but not necessarily the data contained in the communication) by reasoning from characteristics or byproducts of communications. This includes:
1643:
is "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions." This is in contrast to traditional threat management measures, such as
447:
in order to accomplish to a security strategy set up following rules and regulations applicable in a country. Countermeasures are also called security controls; when applied to the transmission of information are named
1021:
The following subentries describe four kinds of threat consequences, and also list and describe the kinds of threat actions that cause each consequence. Threat actions that are accidental events are marked by "*".
839:
It is important to separate the concept of the event that a threat agent get in contact with the asset (even virtually, i.e. through the network) and the event that a threat agent act against the asset.
802:
is used to indicate an individual or group that can manifest a threat. It is fundamental to identify who would want to exploit the assets of a company, and how they might use them against the company.
1029:
A circumstance or event whereby an entity gains access to data for which the entity is not authorized. (See: data confidentiality.). The following threat actions can cause unauthorized disclosure:
321:
Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures
2505: 1146:
Gaining indirect knowledge of communicated data by monitoring and analyzing a signal that is emitted by a system and that contains the data but is not intended to communicate the data.
1115:
Gaining direct knowledge of communicated data by monitoring and resolving a signal that is emitted by a system and that contains the data but is not intended to communicate the data.
375:
A resource (both physical or logical) can have one or more vulnerabilities that can be exploited by a threat agent in a threat action. The result can potentially compromise the
1511:
In the context of misuse, any hardware, software, or firmware intentionally introduced into a system to perform or control the execution of an unauthorized function or service.
428:(see figure) depicts the same phenomenon in slightly different terms: a threat agent through an attack vector exploits a weakness (vulnerability) of the system and the related 304:
Any circumstance or event with the potential to adversely impact an asset through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.
291:
Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.
345: 493:, can be a mean to get in touch with people in charge of system administration or even system security, inducing them to reveal sensitive information. One famous case is 1327:
In the context of incapacitation, any hardware, firmware, or software (e.g., logic bomb) intentionally introduced into a system to destroy system functions or resources.
1669: 1381:
In the context of corruption, any hardware, firmware, or software (e.g., a computer virus) intentionally introduced into a system to modify system functions or data.
1505:
In the context of misuse, deliberate alteration of a system's logic, data, or control information to cause the system to perform unauthorized functions or services.
1375:
In the context of corruption, deliberate alteration of a system's logic, data, or control information to interrupt or prevent correct operation of system functions.
1214:
A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. The following threat actions can cause deception:
1453:
A circumstance or event that results in the control of system services or functions by an unauthorized entity. The following threat actions can cause usurpation:
1538:
A collection of threats in a particular domain or context, with information on identified vulnerable assets, threats, risks, threat actors and observed trends.
229: 1089:
A threat action whereby an unauthorized entity directly accesses sensitive data travelling between authorized sources and destinations. This includes:
863:
Corporations: Corporations are engaged in offensive information warfare or competitive intelligence. Partners and competitors come under this category.
1939: 2494: 777:
The spread over a network of threats can lead to dangerous situations. In military and civil fields, threat level has been defined: for example
2565: 1160:
A threat action whereby an unauthorized entity gains access to sensitive data by circumventing a system's security protections. This includes:
387:
properties of resources (potentially different than the vulnerable one) of the organization and others involved parties (customers, suppliers).
2438: 2400: 1974:
Schou, Corey (1996). Handbook of INFOSEC Terms, Version 2.0. CD-ROM (Idaho State University & Information Systems Security Organization)
2224: 603:
access to high-value targets. Fileless malware attacks use techniques that allow malware to run in memory, making it difficult to detect.
51: 414:" attempts to learn or make use of information from the system but does not affect system resources: so it compromises Confidentiality. 238:
who is an individual or group that can perform the threat action, such as exploiting a vulnerability to actualise a negative impact. An
1220:
A threat action whereby an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.
2088: 843:
OWASP collects a list of potential threat agents to prevent system designers, and programmers insert vulnerabilities in the software.
3109: 1653: 1583:
Many organizations perform only a subset of these methods, adopting countermeasures based on a non-systematic approach, resulting in
1862:"Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems" 1558: 1099:
Gaining access to sensitive data by stealing a shipment of a physical medium, such as a magnetic tape or disk, that holds the data.
258:
Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems
2069:
Security engineering:a guide to building dependable distributed systems, second edition, Ross Anderson, Wiley, 2008 – 1040 pages
279: 1557:
plans in order to protect, maintain and recover business-critical processes and systems. Some of these plans are implemented by
818:
Misuse – unauthorized use of assets (e.g., identity theft, setting up a porn distribution service on a compromised server, etc.)
462:
The widespread of computer dependencies and the consequent raising of the consequence of a successful attack, led to a new term
273:
denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability
436: 3086: 2074: 2019: 2392: 2148: 520:
in the framework of an ISMS: a pure technical approach will let out the psychological attacks that are increasing threats.
449: 2035: 3143: 3117: 327: 1631:
Technology and skilled people leveraging situational awareness to enable rapid decisions and automated or manual actions
1495:
A threat action that causes a system component to perform a function or service that is detrimental to system security.
2558: 971:
is the analysis of the probability of occurrences and consequences of damaging actions to a system. It is the basis of
856:
Employees: Staff, contractors, operational/maintenance personnel, or security guards who are annoyed with the company.
408:
when it attempts to alter system resources or affect their operation: so it compromises Integrity or Availability. A "
3049: 2138:
ISO/IEC, "Information technology – Security techniques-Information security risk management" ISO/IEC FIDIS 27005:2008
1915: 1628:
Use of advanced analytics to optimize intelligence, generate security intelligence, and provide Situational Awareness
176: 65: 17: 1433:
Hindrance of system operation by placing excess burden on the performance capabilities of a system component. (See:
1069:
Human action or inaction that unintentionally results in an entity gaining unauthorized knowledge of sensitive data.
2845: 2056: 778: 1307:
A circumstance or event that interrupts or prevents the correct operation of system services and functions. (See:
3099: 2396: 1822: 1753: 1196:
Transforming encrypted data into plain text without having prior knowledge of encryption parameters or processes.
100: 57: 1554: 900:
The following threat communities are examples of the human malicious threat landscape many organizations face:
1889: 1625:
Comprehensive methodology for real-time monitoring including advanced techniques such as behavioural modelling
370: 2912: 2551: 1679:"Machine-learning and UEBA, used to develop aggregated risk scores that can also serve as hunting hypotheses" 482: 1594:
is a significant market. There has been a lot of software developed to deal with IT threats, including both
853:
Non-Target Specific: Non-Target Specific Threat Agents are computer viruses, worms, trojans and logic bombs.
3148: 1417: 736: 1861: 1365:
A threat action that undesirably alters system operation by adversely modifying system functions or data.
1351:
Any natural disaster (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component.
3104: 3025: 2825: 1463:
A threat action whereby an entity assumes unauthorized logical or physical control of a system resource.
735:
Microsoft previously rated the risk of security threats using five categories in a classification called
516:, but a serious study to apply cost effective countermeasures can only be conducted following a rigorous 240: 1950: 3081: 3039: 2695: 2439:"Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge – TechRepublic" 1769: 1759: 1649: 1572: 1705: 1525:
Action by an entity that exceeds the entity's system privileges by executing an unauthorized function.
1041:
A threat action whereby sensitive data is directly released to an unauthorized entity. This includes:
2942: 2660: 996: 972: 517: 444: 198: 91: 1564:
Threat management must identify, evaluate, and categorize threats. There are two primary methods of
1387:
Human action or inaction that unintentionally results in the alteration of system functions or data.
147: 96: 2927: 2805: 2700: 2113: 1784: 717: 621: 509: 2173: 1105:
Monitoring and recording data that is flowing between two points in a communication system. (See:
3015: 2967: 2630: 2295: 1519: 1277:
A threat action whereby an entity deceives another by falsely denying responsibility for an act.
1140:
Gaining knowledge of data by observing the characteristics of communications that carry the data.
456: 368:
The term "threat" relates to some other basic security terms as shown in the following diagram:
2232: 1691:"Threat intelligence reports, threat intelligence feeds, malware analysis, vulnerability scans" 1423:
Disruption of system operations by blocking communications or user data or control information.
1241: 1170:
Gaining unauthorized physical access to sensitive data by circumventing a system's protections.
490: 2373:
ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media (1 Dec 2014)
1399:
Any natural event (e.g. power surge caused by lightning) that alters system functions or data.
1321:
A threat action that prevents or interrupts system operation by disabling a system component.
1176:
Gaining unauthorized logical access to sensitive data by circumventing a system's protections.
3056: 2790: 1257:
Altering or replacing valid data with false data that serves to deceive an authorized entity.
1247:
A threat action whereby false data deceives an authorized entity. (See: active wiretapping.)
1226:
Attempt by an unauthorized entity to gain access to a system by posing as an authorized user.
954: 253: 212:" negative event (e.g. the possibility of a computer malfunctioning, or the possibility of a 1413:
A threat action that interrupts delivery of system services by hindering system operations.
1345:
Error that causes failure of a system component and leads to disruption of system operation.
1059:
Searching through data residue in a system to gain unauthorized knowledge of sensitive data.
3076: 2988: 2937: 2882: 2750: 2723: 2705: 2603: 2574: 1836: 1764: 1747: 1742: 1645: 1599: 1595: 1083: 987:
approach to security and prioritize their resources to address the most significant risks.
726: 593:
Negligence: Known but neglected factors, compromising the network safety and sustainability
394: 2670: 1075:
System failure that results in an entity gaining unauthorized knowledge of sensitive data.
544:
Compromise of information: eavesdropping, theft of media, retrieval of discarded materials
8: 2860: 2635: 2593: 1984: 1664:
or machine-assisted, as well. In this case, the analyst utilizes software that harnesses
1475:
Unauthorized acquisition of actual hardware, software, or firmware of a system component.
1186:
Acquiring sensitive data by disassembling and analyzing the design of a system component.
1180: 501: 2413: 2382:
ENISA Threat Landscape 2013–Overview of Current and Emerging Cyber-Threats (11 Dec 2013)
1315: 3044: 2972: 2877: 2259: 1591: 1547: 782: 401: 2538: 1685:"Crown Jewel analysis, enterprise risk assessments, company- or employee-level trends" 1333:
Deliberate destruction of a system component to interrupt or prevent system operation.
960:
Various kinds of threat actions are defined as subentries under "threat consequence".
3092: 2850: 2785: 2735: 2682: 2640: 2588: 2495:"SANS 2019 Threat Hunting Survey: The Differing Needs of New and Experienced Hunters" 2070: 2015: 1911: 1779: 1734: 1565: 1369: 1308: 1106: 671: 432:
causing a technical impact on an IT resource (asset) connected to a business impact.
429: 190: 2533: 2468: 1251: 3061: 3001: 2765: 2755: 2650: 2296:"FIPS PUB 31 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION : JUNE 1974" 1826: 1750: β€“ Dealing with all humanitarian aspects of emergencies, i.e. societal threats 1665: 1577: 1457: 1134: 657: 213: 2323: 1407: 2952: 2932: 2830: 2655: 2645: 2348: 1359: 695: 678: 541:
Loss of essential services: electrical power, air conditioning, telecommunication
440: 376: 2199: 1848: 1839: 1816: 1299: 208:" event (i.e. hacking: an individual cracker or a criminal organization) or an " 3122: 3020: 2870: 2820: 2795: 2760: 2740: 2620: 2608: 2501: 1700: 1283:
Action whereby the originator of data denies responsibility for its generation.
1051: 615: 505: 417: 410: 309: 1515: 1289:
Action whereby the recipient of data denies receiving and possessing the data.
1261: 1154: 811:
Threat agents can take one or more of the following actions against an asset:
3137: 3032: 2993: 2962: 2957: 2810: 2800: 2770: 1660:
there has been a warning of a potential threat, or an incident has occurred.
1434: 1190: 1005:
threat landscape and improve their ability to detect and respond to threats.
687: 627: 265: 1427: 1164: 1033: 3066: 2922: 2625: 707: 463: 384: 234: 151: 78: 3006: 2840: 2815: 2780: 2615: 1704:
respondents have experienced a 'significant improvement' in reducing the
1063: 550:
Compromise of functions: error in use, abuse of rights, denial of actions
1499: 932:
Nation-state intelligence services (e.g., counterparts to the CIA, etc.)
201:
that results in an unwanted impact to a computer system or application.
3071: 2887: 2835: 2718: 2598: 2543: 1447: 1093: 957:
deals with both intentional acts (i.e. attacks) and accidental events.
651: 494: 478: 470: 217: 774:
The DREAD name comes from the initials of the five categories listed.
739:. The model is considered obsolete by Microsoft. The categories were: 435:
A set of policies concerned with information security management, the
2947: 2902: 2897: 2745: 2713: 1831: 1206: 1123: 821:
Disclose – the threat agent illicitly discloses sensitive information
711: 667: 390: 380: 205: 140: 1339:
Action or inaction that unintentionally disables a system component.
2907: 2865: 2728: 1546:
Threats should be managed by operating an ISMS, performing all the
1267:
Introducing false data that serves to deceive an authorized entity.
827:
Deny access – includes destruction, theft of a non-data asset, etc.
474: 209: 136: 1728: 244:
is a vulnerability that a threat actor used to cause an incident.
2917: 2892: 2855: 1774: 1393:
Error that results in the alteration of system functions or data.
639: 633: 513: 486: 225: 27:
Potential negative action or event facilitated by a vulnerability
1918:
Document Number: C081 Published by The Open Group, January 2009.
1622:
Manual and automated intelligence gathering and threat analytics
1047:
Intentional release of sensitive data to an unauthorized entity.
2775: 2690: 2010:
Wright, Joe; Jim Harmening (2009). "15". In Vacca, John (ed.).
1940:"An Introduction to Factor Analysis of Information Risk (FAIR)" 1489: 833: 645: 528:
Threats can be classified according to their type and origin:
425: 296: 228:) or otherwise a circumstance, capability, action, or event ( 2089:"Using Facebook to Social Engineer Your Way Around Security" 1018:
Includes disclosure, deception, disruption, and usurpation.
547:
Technical failures: equipment, software, capacity saturation
421:
OWASP: relationship between threat agent and business impact
346:
National Information Assurance Training and Education Center
2014:. Morgan Kaufmann Publications. Elsevier Inc. p. 257. 849:
These individuals and groups can be classified as follows:
846:
Threat Agent = Capabilities + Intentions + Past Activities
261: 221: 1550:
activities foreseen by laws, standards and methodologies.
1016:
is a security violation that results from a threat action.
758:
xploitability – how much work is it to launch the attack?
752:
eproducibility – how easy it is to reproduce the attack?
785:
vendors publish global threat level on their websites.
770:
iscoverability – how easy it is to discover the threat?
1311:.) The following threat actions can cause disruption: 872:
Natural: Flood, fire, lightning, meteor, earthquakes.
197:
is a potential negative action or event enabled by a
1724: 2009: 556:Note that a threat type can have multiple origins. 439:(ISMS), has been developed to manage, according to 1533: 2149:"Ransomware Trends, Statistics and Facts in 2023" 764:ffected users – how many people will be impacted? 3135: 1611:intelligence management or response procedures. 1026:"Unauthorized disclosure" (a threat consequence) 2280:HMG IA Standard No. 1 Technical Risk Assessment 2200:"McAfee Threat Intelligence | McAfee, Inc" 866:Human, Unintentional: Accidents, carelessness. 2559: 2401:Category:Computer security software companies 2086: 611:Below are the few common emerging threats:- 252:A more comprehensive definition, tied to an 1656:, which typically involve an investigation 538:Natural events: climatic, seismic, volcanic 66:Learn how and when to remove these messages 2566: 2552: 2114:"Social engineering via Social networking" 2012:Computer and Information Security Handbook 1605: 793: 781:is a threat level used by the US. Leading 3110:Security information and event management 2290: 2288: 2286: 1830: 1810: 1808: 1806: 1804: 1802: 1800: 1481:Unauthorized acquisition and use of data. 1469:Unauthorized use of service by an entity. 824:Modify – unauthorized changes to an asset 523: 177:Learn how and when to remove this message 2573: 2254: 2252: 2250: 2132: 1559:computer security incident response team 662: 560:Deliberate: aiming at information asset 416: 1934: 1932: 1930: 1928: 1926: 1924: 1553:Very large organizations tend to adopt 535:Physical damage: fire, water, pollution 469:Nowadays the many real attacks exploit 437:Information security management systems 348:gives a more articulated definition of 280:National Information Assurance Glossary 247: 14: 3136: 2492: 2283: 1814: 1797: 990: 920:Cyber-criminals (professional hackers) 869:Human, Intentional: Insider, outsider. 674:, from the initials of threat groups: 3087:Host-based intrusion detection system 2547: 2463: 2461: 2459: 2247: 1008: 885: 504:is about technical threats such as a 500:The most widespread documentation on 340:that can cause a loss event to occur. 2393:Category:Computer security companies 2349:"What is Threat Intelligence? | IBM" 2324:"Threat Modeling | OWASP Foundation" 2003: 1921: 1711: 1541: 232:is often used as a blanket term). A 119: 72: 31: 3118:Runtime application self-protection 1670:user and entity behaviour analytics 815:Access – simple unauthorized access 788: 746:amage – how bad would an attack be? 455:The overall picture represents the 328:Factor analysis of information risk 204:A threat can be either a negative " 24: 2669: 2456: 978: 963: 25: 3160: 3050:Security-focused operating system 2539:Cyber Threat Management Framework 2527: 2511:from the original on 1 March 2022 2414:"What is Cyber Threat Management" 2231:. 10 January 2012. Archived from 1910:Technical Standard Risk Taxonomy 1635: 951:is an assault on system security. 935:Malware (virus/worm/etc.) authors 606: 597: 47:This article has multiple issues. 2846:Insecure direct object reference 1727: 943: 876: 473:at least as much as technology. 369: 363: 256:point of view, can be found in " 124: 77: 36: 3100:Information security management 2493:Fuchs, Mathias; Lemon, Joshua. 2486: 2431: 2406: 2397:Category:Free security software 2385: 2376: 2367: 2341: 2316: 2274: 2217: 2192: 2166: 2141: 2106: 2080: 2063: 1949:. November 2006. Archived from 1892:. Enisa.europa.eu. 24 July 2009 1754:Internet Engineering Task Force 1534:Threat landscape or environment 55:or discuss these issues on the 2469:"Cyber Threat Hunting – Sqrrl" 2028: 1977: 1968: 1904: 1882: 1854: 1555:business continuity management 1390:* "Hardware or software error" 1342:* "Hardware or software error" 139:format but may read better as 13: 1: 2087:Brian Prince (7 April 2009). 2036:"ISACA THE RISK IT FRAMEWORK" 1790: 1683:Situational-awareness driven: 481:and other methods are called 737:DREAD: Risk assessment model 299:gives a similar definition: 7: 3105:Information risk management 3026:Multi-factor authentication 2582:Related security categories 2225:"Threatcon – Symantec Corp" 1720: 1650:intrusion detection systems 1072:* "Hardware/software error" 489:applications, specifically 90:to comply with Knowledge's 10: 3165: 3144:Computer security exploits 3082:Intrusion detection system 3040:Computer security software 2696:Advanced persistent threat 1851:. 1818:Internet Security Glossary 1770:Intrusion detection system 1760:Information security audit 1573:Information security audit 994: 566:illegal processing of data 2981: 2681: 2667: 2661:Digital rights management 2581: 2174:"The STRIDE Threat Model" 1947:Riskmanagementinsight.com 1286:"False denial of receipt" 997:Cyber threat intelligence 909:Contractors (and vendors) 2806:Denial-of-service attack 2701:Arbitrary code execution 2262:. OWASP. 9 December 2011 1785:Vulnerability management 1472:"Theft of functionality" 1450:" (a threat consequence) 1302:" (a threat consequence) 1280:"False denial of origin" 1209:" (a threat consequence) 926:Non-professional hackers 266:United States of America 103:may contain suggestions. 88:may need to be rewritten 3016:Computer access control 2968:Rogue security software 2631:Electromagnetic warfare 2260:"Category:Threat Agent" 1815:Shirey, R. (May 2000). 1606:Cyber threat management 1102:"Wiretapping (passive)" 794:Threat agents or actors 706:nformation disclosure ( 491:Social network services 148:converting this article 3062:Obfuscation (software) 2791:Browser Helper Objects 2675: 1847:Obsoleted by RFC  1330:"Physical destruction" 809: 670:published a mnemonic, 656:●      650:●      644:●      638:●      632:●      626:●      620:●      614:●      524:Threats classification 459:of the risk scenario. 422: 3057:Data-centric security 2938:Remote access trojans 2673: 2057:registration required 1112:"Emanations analysis" 1044:"Deliberate Exposure" 955:security architecture 836:asset like a laptop. 807:through a data cable. 804: 730:levation of privilege 663:Threat classification 420: 254:Information assurance 2989:Application security 2883:Privilege escalation 2751:Cross-site scripting 2604:Cybersex trafficking 2575:Information security 2077:, Chapter 2, page 17 1765:Information security 1748:Emergency management 1743:Cyber threat hunting 1689:Intelligence-driven: 1641:Cyber threat hunting 1600:proprietary software 1596:open-source software 1396:* "Natural disaster" 1348:* "Natural disaster" 588:loss of power supply 395:information security 248:Standard definitions 3149:Security compliance 2636:Information warfare 2594:Automotive security 1985:"Glossary of Terms" 1956:on 18 November 2014 1585:computer insecurity 1181:Reverse engineering 1002:Threat intelligence 991:Threat intelligence 502:computer insecurity 3045:Antivirus software 2913:Social engineering 2878:Polymorphic engine 2831:Fraudulent dialers 2736:Hardware backdoors 2676: 2534:Term in FISMApedia 2504:. pp. 2, 16. 2403:for partial lists. 2180:. 12 November 2009 2178:msdn.microsoft.com 1991:. 12 December 2011 1890:"Glossary – ENISA" 1592:security awareness 1548:IT risk management 1466:"Theft of service" 1143:"Signals analysis" 1014:Threat consequence 1009:Threat consequence 891:Threat communities 886:Threat communities 783:antivirus software 532:Types of threats: 483:social engineering 423: 150:, if appropriate. 3131: 3130: 3093:Anomaly detection 2998:Secure by default 2851:Keystroke loggers 2786:Drive-by download 2674:vectorial version 2641:Internet security 2589:Computer security 2355:. 2 November 2022 2075:978-0-470-06852-6 2021:978-0-12-374354-1 1780:Physical security 1735:Technology portal 1712:Threat Mitigation 1677:Analytics-driven: 1566:threat assessment 1542:Threat management 1508:"Malicious logic" 1378:"Malicious logic" 1324:"Malicious logic" 1309:denial of service 1229:"Malicious logic" 574:equipment failure 450:security services 430:security controls 216:event such as an 191:computer security 187: 186: 179: 169: 168: 118: 117: 92:quality standards 70: 18:Threat (computer) 16:(Redirected from 3156: 3002:Secure by design 2933:Hardware Trojans 2766:History sniffing 2756:Cross-site leaks 2651:Network security 2568: 2561: 2554: 2545: 2544: 2521: 2520: 2518: 2516: 2510: 2499: 2490: 2484: 2483: 2481: 2479: 2465: 2454: 2453: 2451: 2449: 2435: 2429: 2428: 2426: 2424: 2410: 2404: 2389: 2383: 2380: 2374: 2371: 2365: 2364: 2362: 2360: 2345: 2339: 2338: 2336: 2334: 2320: 2314: 2313: 2311: 2309: 2300: 2292: 2281: 2278: 2272: 2271: 2269: 2267: 2256: 2245: 2244: 2242: 2240: 2221: 2215: 2214: 2212: 2210: 2196: 2190: 2189: 2187: 2185: 2170: 2164: 2163: 2161: 2159: 2145: 2139: 2136: 2130: 2129: 2127: 2125: 2120:. 4 October 2010 2118:Networkworld.com 2110: 2104: 2103: 2101: 2099: 2084: 2078: 2067: 2061: 2060: 2053: 2051: 2049: 2040: 2032: 2026: 2025: 2007: 2001: 2000: 1998: 1996: 1981: 1975: 1972: 1966: 1965: 1963: 1961: 1955: 1944: 1936: 1919: 1908: 1902: 1901: 1899: 1897: 1886: 1880: 1879: 1877: 1875: 1866: 1858: 1852: 1843: 1834: 1832:10.17487/RFC2828 1812: 1737: 1732: 1731: 1666:machine learning 1578:Penetration test 1458:Misappropriation 1135:Traffic analysis 789:Associated terms 721:enial of Service 684:of user identity 658:Fileless malware 616:Computer viruses 577:software failure 518:IT risk analysis 485:techniques. The 443:principles, the 393:is the basis of 373: 214:natural disaster 182: 175: 164: 161: 155: 146:You can help by 128: 127: 120: 113: 110: 104: 81: 73: 62: 40: 39: 32: 21: 3164: 3163: 3159: 3158: 3157: 3155: 3154: 3153: 3134: 3133: 3132: 3127: 2977: 2677: 2665: 2656:Copy protection 2646:Mobile security 2577: 2572: 2530: 2525: 2524: 2514: 2512: 2508: 2497: 2491: 2487: 2477: 2475: 2467: 2466: 2457: 2447: 2445: 2437: 2436: 2432: 2422: 2420: 2412: 2411: 2407: 2390: 2386: 2381: 2377: 2372: 2368: 2358: 2356: 2347: 2346: 2342: 2332: 2330: 2322: 2321: 2317: 2307: 2305: 2298: 2294: 2293: 2284: 2279: 2275: 2265: 2263: 2258: 2257: 2248: 2238: 2236: 2235:on 9 March 2007 2223: 2222: 2218: 2208: 2206: 2198: 2197: 2193: 2183: 2181: 2172: 2171: 2167: 2157: 2155: 2147: 2146: 2142: 2137: 2133: 2123: 2121: 2112: 2111: 2107: 2097: 2095: 2085: 2081: 2068: 2064: 2054: 2047: 2045: 2038: 2034: 2033: 2029: 2022: 2008: 2004: 1994: 1992: 1983: 1982: 1978: 1973: 1969: 1959: 1957: 1953: 1942: 1938: 1937: 1922: 1909: 1905: 1895: 1893: 1888: 1887: 1883: 1873: 1871: 1864: 1860: 1859: 1855: 1813: 1798: 1793: 1733: 1726: 1723: 1714: 1638: 1608: 1544: 1536: 1478:"Theft of data" 1384:* "Human error" 1336:* "Human error" 1017: 1011: 999: 993: 984:Threat modeling 981: 979:Threat modeling 969:Threat analysis 966: 964:Threat analysis 952: 946: 888: 879: 796: 791: 665: 609: 600: 526: 445:countermeasures 441:risk management 388: 377:confidentiality 374: 366: 250: 183: 172: 171: 170: 165: 159: 156: 145: 129: 125: 114: 108: 105: 95: 82: 41: 37: 28: 23: 22: 15: 12: 11: 5: 3162: 3152: 3151: 3146: 3129: 3128: 3126: 3125: 3123:Site isolation 3120: 3115: 3114: 3113: 3107: 3097: 3096: 3095: 3090: 3079: 3074: 3069: 3064: 3059: 3054: 3053: 3052: 3047: 3037: 3036: 3035: 3030: 3029: 3028: 3021:Authentication 3013: 3012: 3011: 3010: 3009: 2999: 2996: 2985: 2983: 2979: 2978: 2976: 2975: 2970: 2965: 2960: 2955: 2950: 2945: 2940: 2935: 2930: 2925: 2920: 2915: 2910: 2905: 2900: 2895: 2890: 2885: 2880: 2875: 2874: 2873: 2863: 2858: 2853: 2848: 2843: 2838: 2833: 2828: 2823: 2821:Email spoofing 2818: 2813: 2808: 2803: 2798: 2793: 2788: 2783: 2778: 2773: 2768: 2763: 2761:DOM clobbering 2758: 2753: 2748: 2743: 2741:Code injection 2738: 2733: 2732: 2731: 2726: 2721: 2716: 2708: 2703: 2698: 2693: 2687: 2685: 2679: 2678: 2668: 2666: 2664: 2663: 2658: 2653: 2648: 2643: 2638: 2633: 2628: 2623: 2621:Cyberterrorism 2618: 2613: 2612: 2611: 2609:Computer fraud 2606: 2596: 2591: 2585: 2583: 2579: 2578: 2571: 2570: 2563: 2556: 2548: 2542: 2541: 2536: 2529: 2528:External links 2526: 2523: 2522: 2502:SANS Institute 2485: 2455: 2430: 2405: 2384: 2375: 2366: 2340: 2315: 2282: 2273: 2246: 2216: 2191: 2165: 2140: 2131: 2105: 2079: 2062: 2027: 2020: 2002: 1976: 1967: 1920: 1903: 1881: 1853: 1845:Informational. 1795: 1794: 1792: 1789: 1788: 1787: 1782: 1777: 1772: 1767: 1762: 1757: 1751: 1745: 1739: 1738: 1722: 1719: 1713: 1710: 1701:SANS Institute 1693: 1692: 1686: 1680: 1637: 1636:Threat hunting 1634: 1633: 1632: 1629: 1626: 1623: 1618:CTM includes: 1607: 1604: 1581: 1580: 1575: 1543: 1540: 1535: 1532: 1531: 1530: 1529: 1528: 1527: 1526: 1523: 1512: 1509: 1506: 1503: 1493: 1485: 1484: 1483: 1482: 1479: 1476: 1473: 1470: 1467: 1461: 1451: 1443: 1442: 1441: 1440: 1439: 1438: 1431: 1424: 1421: 1411: 1403: 1402: 1401: 1400: 1397: 1394: 1391: 1388: 1385: 1382: 1379: 1376: 1373: 1363: 1355: 1354: 1353: 1352: 1349: 1346: 1343: 1340: 1337: 1334: 1331: 1328: 1325: 1319: 1316:Incapacitation 1305: 1303: 1295: 1294: 1293: 1292: 1291: 1290: 1287: 1284: 1281: 1275: 1271: 1270: 1269: 1268: 1265: 1258: 1255: 1245: 1237: 1236: 1235: 1234: 1230: 1227: 1224: 1218: 1212: 1210: 1202: 1201: 1200: 1199: 1198: 1197: 1194: 1187: 1184: 1177: 1174: 1171: 1168: 1158: 1150: 1149: 1148: 1147: 1144: 1141: 1138: 1127: 1119: 1118: 1117: 1116: 1113: 1110: 1103: 1100: 1097: 1087: 1079: 1078: 1077: 1076: 1073: 1070: 1067: 1060: 1057: 1055: 1048: 1045: 1039: 1037: 1027: 1010: 1007: 995:Main article: 992: 989: 980: 977: 965: 962: 945: 942: 941: 940: 939: 938: 937: 936: 933: 930: 927: 924: 921: 915: 914: 913: 910: 907: 898: 892: 887: 884: 878: 875: 874: 873: 870: 867: 864: 861: 857: 854: 829: 828: 825: 822: 819: 816: 795: 792: 790: 787: 772: 771: 765: 759: 753: 747: 733: 732: 724: 715: 708:privacy breach 701: 693: 685: 664: 661: 608: 607:Common Threats 605: 599: 598:Threats Trends 596: 595: 594: 591: 590: 589: 586: 582:Environmental 580: 579: 578: 575: 569: 568: 567: 564: 554: 553: 552: 551: 548: 545: 542: 539: 536: 525: 522: 506:computer virus 411:passive attack 389:The so-called 365: 362: 361: 360: 343: 342: 325: 324: 310:The Open Group 307: 306: 294: 293: 277: 276: 249: 246: 185: 184: 167: 166: 132: 130: 123: 116: 115: 85: 83: 76: 71: 45: 44: 42: 35: 26: 9: 6: 4: 3: 2: 3161: 3150: 3147: 3145: 3142: 3141: 3139: 3124: 3121: 3119: 3116: 3111: 3108: 3106: 3103: 3102: 3101: 3098: 3094: 3091: 3088: 3085: 3084: 3083: 3080: 3078: 3075: 3073: 3070: 3068: 3065: 3063: 3060: 3058: 3055: 3051: 3048: 3046: 3043: 3042: 3041: 3038: 3034: 3033:Authorization 3031: 3027: 3024: 3023: 3022: 3019: 3018: 3017: 3014: 3008: 3005: 3004: 3003: 3000: 2997: 2995: 2994:Secure coding 2992: 2991: 2990: 2987: 2986: 2984: 2980: 2974: 2971: 2969: 2966: 2964: 2963:SQL injection 2961: 2959: 2956: 2954: 2951: 2949: 2946: 2944: 2943:Vulnerability 2941: 2939: 2936: 2934: 2931: 2929: 2928:Trojan horses 2926: 2924: 2923:Software bugs 2921: 2919: 2916: 2914: 2911: 2909: 2906: 2904: 2901: 2899: 2896: 2894: 2891: 2889: 2886: 2884: 2881: 2879: 2876: 2872: 2869: 2868: 2867: 2864: 2862: 2859: 2857: 2854: 2852: 2849: 2847: 2844: 2842: 2839: 2837: 2834: 2832: 2829: 2827: 2824: 2822: 2819: 2817: 2814: 2812: 2811:Eavesdropping 2809: 2807: 2804: 2802: 2801:Data scraping 2799: 2797: 2794: 2792: 2789: 2787: 2784: 2782: 2779: 2777: 2774: 2772: 2771:Cryptojacking 2769: 2767: 2764: 2762: 2759: 2757: 2754: 2752: 2749: 2747: 2744: 2742: 2739: 2737: 2734: 2730: 2727: 2725: 2722: 2720: 2717: 2715: 2712: 2711: 2709: 2707: 2704: 2702: 2699: 2697: 2694: 2692: 2689: 2688: 2686: 2684: 2680: 2672: 2662: 2659: 2657: 2654: 2652: 2649: 2647: 2644: 2642: 2639: 2637: 2634: 2632: 2629: 2627: 2624: 2622: 2619: 2617: 2614: 2610: 2607: 2605: 2602: 2601: 2600: 2597: 2595: 2592: 2590: 2587: 2586: 2584: 2580: 2576: 2569: 2564: 2562: 2557: 2555: 2550: 2549: 2546: 2540: 2537: 2535: 2532: 2531: 2507: 2503: 2496: 2489: 2474: 2470: 2464: 2462: 2460: 2444: 2440: 2434: 2419: 2415: 2409: 2402: 2398: 2394: 2388: 2379: 2370: 2354: 2350: 2344: 2329: 2325: 2319: 2304: 2297: 2291: 2289: 2287: 2277: 2261: 2255: 2253: 2251: 2234: 2230: 2226: 2220: 2205: 2201: 2195: 2179: 2175: 2169: 2154: 2150: 2144: 2135: 2119: 2115: 2109: 2094: 2090: 2083: 2076: 2072: 2066: 2058: 2044: 2037: 2031: 2023: 2017: 2013: 2006: 1990: 1986: 1980: 1971: 1952: 1948: 1941: 1935: 1933: 1931: 1929: 1927: 1925: 1917: 1916:1-931624-77-1 1913: 1907: 1891: 1885: 1870: 1869:Carc.nist.gov 1863: 1857: 1850: 1846: 1841: 1838: 1833: 1828: 1824: 1820: 1819: 1811: 1809: 1807: 1805: 1803: 1801: 1796: 1786: 1783: 1781: 1778: 1776: 1773: 1771: 1768: 1766: 1763: 1761: 1758: 1755: 1752: 1749: 1746: 1744: 1741: 1740: 1736: 1730: 1725: 1718: 1709: 1707: 1702: 1697: 1690: 1687: 1684: 1681: 1678: 1675: 1674: 1673: 1671: 1667: 1661: 1659: 1655: 1651: 1647: 1642: 1630: 1627: 1624: 1621: 1620: 1619: 1616: 1612: 1603: 1601: 1597: 1593: 1588: 1586: 1579: 1576: 1574: 1571: 1570: 1569: 1567: 1562: 1560: 1556: 1551: 1549: 1539: 1524: 1521: 1517: 1513: 1510: 1507: 1504: 1501: 1497: 1496: 1494: 1491: 1487: 1486: 1480: 1477: 1474: 1471: 1468: 1465: 1464: 1462: 1459: 1455: 1454: 1452: 1449: 1445: 1444: 1436: 1432: 1429: 1425: 1422: 1419: 1415: 1414: 1412: 1409: 1405: 1404: 1398: 1395: 1392: 1389: 1386: 1383: 1380: 1377: 1374: 1371: 1367: 1366: 1364: 1361: 1357: 1356: 1350: 1347: 1344: 1341: 1338: 1335: 1332: 1329: 1326: 1323: 1322: 1320: 1317: 1313: 1312: 1310: 1306: 1304: 1301: 1297: 1296: 1288: 1285: 1282: 1279: 1278: 1276: 1274:"Repudiation" 1273: 1272: 1266: 1263: 1259: 1256: 1253: 1249: 1248: 1246: 1243: 1242:Falsification 1239: 1238: 1231: 1228: 1225: 1222: 1221: 1219: 1216: 1215: 1213: 1211: 1208: 1204: 1203: 1195: 1192: 1191:Cryptanalysis 1188: 1185: 1182: 1178: 1175: 1173:"Penetration" 1172: 1169: 1166: 1162: 1161: 1159: 1156: 1152: 1151: 1145: 1142: 1139: 1136: 1132: 1131: 1128: 1125: 1121: 1120: 1114: 1111: 1108: 1104: 1101: 1098: 1095: 1091: 1090: 1088: 1085: 1081: 1080: 1074: 1071: 1068: 1065: 1061: 1058: 1056: 1053: 1049: 1046: 1043: 1042: 1040: 1038: 1035: 1031: 1030: 1028: 1025: 1024: 1023: 1019: 1015: 1006: 1003: 998: 988: 985: 976: 974: 973:risk analysis 970: 961: 958: 956: 950: 949:Threat action 944:Threat action 934: 931: 928: 925: 922: 919: 918: 916: 911: 908: 905: 904: 902: 901: 899: 897: 893: 890: 889: 883: 877:Threat source 871: 868: 865: 862: 858: 855: 852: 851: 850: 847: 844: 841: 837: 835: 826: 823: 820: 817: 814: 813: 812: 808: 803: 801: 786: 784: 780: 775: 769: 766: 763: 760: 757: 754: 751: 748: 745: 742: 741: 740: 738: 731: 729: 725: 722: 720: 716: 713: 709: 705: 702: 700: 698: 694: 692: 690: 686: 683: 681: 677: 676: 675: 673: 669: 660: 659: 654: 653: 648: 647: 642: 641: 636: 635: 630: 629: 624: 623: 622:Trojan horses 618: 617: 612: 604: 592: 587: 585:natural event 584: 583: 581: 576: 573: 572: 570: 565: 562: 561: 559: 558: 557: 549: 546: 543: 540: 537: 534: 533: 531: 530: 529: 521: 519: 515: 511: 507: 503: 498: 496: 492: 488: 484: 480: 476: 472: 467: 465: 460: 458: 453: 451: 446: 442: 438: 433: 431: 427: 419: 415: 413: 412: 407: 403: 398: 396: 392: 386: 382: 378: 372: 364:Phenomenology 359: 355: 354: 353: 351: 347: 341: 337: 336: 335: 333: 329: 322: 319: 318: 317: 315: 311: 305: 302: 301: 300: 298: 292: 289: 288: 287: 285: 281: 274: 270: 269: 268: 267: 263: 259: 255: 245: 243: 242: 237: 236: 231: 227: 223: 219: 215: 211: 207: 202: 200: 199:vulnerability 196: 192: 181: 178: 163: 154:is available. 153: 149: 143: 142: 138: 133:This article 131: 122: 121: 112: 102: 98: 93: 89: 86:This article 84: 80: 75: 74: 69: 67: 60: 59: 54: 53: 48: 43: 34: 33: 30: 19: 3067:Data masking 2626:Cyberwarfare 2513:. Retrieved 2488: 2476:. Retrieved 2472: 2446:. Retrieved 2443:TechRepublic 2442: 2433: 2421:. Retrieved 2417: 2408: 2387: 2378: 2369: 2357:. Retrieved 2352: 2343: 2331:. Retrieved 2327: 2318: 2306:. Retrieved 2302: 2276: 2264:. Retrieved 2237:. Retrieved 2233:the original 2229:Symantec.com 2228: 2219: 2207:. Retrieved 2203: 2194: 2182:. Retrieved 2177: 2168: 2156:. Retrieved 2152: 2143: 2134: 2122:. Retrieved 2117: 2108: 2096:. Retrieved 2092: 2082: 2065: 2046:. Retrieved 2042: 2030: 2011: 2005: 1993:. Retrieved 1988: 1979: 1970: 1958:. Retrieved 1951:the original 1946: 1906: 1894:. Retrieved 1884: 1872:. Retrieved 1868: 1856: 1844: 1817: 1715: 1698: 1694: 1688: 1682: 1676: 1662: 1657: 1640: 1639: 1617: 1613: 1609: 1590:Information 1589: 1584: 1582: 1563: 1552: 1545: 1537: 1418:Interference 1252:Substitution 1217:"Masquerade" 1084:Interception 1020: 1013: 1012: 1001: 1000: 983: 982: 968: 967: 959: 948: 947: 894: 880: 848: 845: 842: 838: 830: 810: 805: 800:Threat Agent 799: 797: 776: 773: 767: 761: 755: 749: 743: 734: 727: 718: 703: 696: 688: 679: 666: 655: 649: 643: 637: 631: 625: 619: 613: 610: 601: 555: 527: 499: 468: 464:cyberwarfare 461: 457:risk factors 454: 434: 424: 409: 405: 399: 385:availability 367: 356: 349: 344: 338: 331: 326: 320: 313: 308: 303: 295: 290: 283: 278: 271: 257: 251: 239: 235:threat actor 233: 203: 194: 188: 173: 157: 152:Editing help 134: 106: 97:You can help 87: 63: 56: 50: 49:Please help 46: 29: 3007:Misuse case 2841:Infostealer 2816:Email fraud 2781:Data breach 2616:Cybergeddon 2353:www.ibm.com 2303:Tricare.mil 2266:13 February 2239:13 February 2209:13 February 2124:13 February 1995:13 February 1989:Niatec.info 1520:permissions 1408:Obstruction 1107:wiretapping 1064:Human error 953:A complete 571:Accidental 206:intentional 3138:Categories 3072:Encryption 2948:Web shells 2888:Ransomware 2836:Hacktivism 2599:Cybercrime 2423:28 January 2308:5 November 2204:Mcafee.com 2098:5 November 2048:5 November 1960:5 November 1896:5 November 1874:5 November 1791:References 1706:dwell time 1448:Usurpation 1360:Corruption 1300:Disruption 1052:Scavenging 699:epudiation 652:Ransomware 512:and other 495:Robin Sage 479:Pretexting 471:Psychology 218:earthquake 210:accidental 52:improve it 2903:Shellcode 2898:Scareware 2746:Crimeware 2706:Backdoors 2418:ioctm.org 2328:owasp.org 2093:Eweek.com 2043:Isaca.org 1646:firewalls 1561:(CSIRT). 1516:Violation 1262:Insertion 1207:Deception 1155:Intrusion 1124:Inference 929:Activists 917:External 906:Employees 903:Internal 798:The term 712:Data leak 668:Microsoft 391:CIA triad 381:integrity 160:July 2024 109:July 2024 101:talk page 58:talk page 3077:Firewall 2982:Defenses 2908:Spamming 2893:Rootkits 2866:Phishing 2826:Exploits 2506:Archived 2184:28 March 2153:Security 1721:See also 1717:threat. 1435:flooding 1428:Overload 1165:Trespass 1034:Exposure 912:Partners 723:(D.o.S.) 691:ampering 634:Rootkits 475:Phishing 330:defines 312:defines 282:defines 230:incident 2918:Spyware 2861:Payload 2856:Malware 2796:Viruses 2776:Botnets 2683:Threats 1775:IT risk 1223:"Spoof" 779:INFOCON 682:poofing 640:Spyware 514:malware 487:Web 2.0 404:can be 332:threat 241:exploit 226:tornado 224:, or a 3112:(SIEM) 3089:(HIDS) 2973:Zombie 2710:Bombs 2691:Adware 2515:11 May 2478:7 June 2448:7 June 2399:, and 2073:  2018:  1914:  1756:(IETF) 1652:, and 1500:Tamper 1490:Misuse 1370:Tamper 1233:logic. 834:pawned 672:STRIDE 646:Adware 563:spying 510:trojan 406:active 402:attack 350:threat 314:threat 284:threat 195:threat 135:is in 99:. The 2958:Worms 2953:Wiper 2871:Voice 2719:Logic 2509:(PDF) 2498:(PDF) 2473:Sqrrl 2359:9 May 2333:9 May 2299:(PDF) 2158:9 May 2039:(PDF) 1954:(PDF) 1943:(PDF) 1865:(PDF) 1658:after 1654:SIEMs 1094:Theft 923:Spies 860:them. 628:Worms 426:OWASP 297:ENISA 260:" by 141:prose 2724:Time 2714:Fork 2517:2022 2480:2016 2450:2016 2425:2015 2391:See 2361:2023 2335:2023 2310:2013 2268:2012 2241:2012 2211:2012 2186:2017 2160:2023 2126:2012 2100:2013 2071:ISBN 2050:2013 2016:ISBN 1997:2012 1962:2013 1912:ISBN 1898:2013 1876:2013 1849:4949 1840:2828 1823:IETF 1699:The 1668:and 1598:and 477:and 400:The 334:as: 316:as: 286:as: 262:NIST 222:fire 220:, a 193:, a 137:list 2729:Zip 1837:RFC 1827:doi 1518:of 1086:": 1062:* " 710:or 383:or 264:of 189:In 3140:: 2500:. 2471:. 2458:^ 2441:. 2416:. 2395:, 2351:. 2326:. 2301:. 2285:^ 2249:^ 2227:. 2202:. 2176:. 2151:. 2116:. 2091:. 2041:. 1987:. 1945:. 1923:^ 1867:. 1835:. 1825:. 1821:. 1799:^ 1708:. 1648:, 1602:. 1587:. 1568:: 1437:.) 1109:.) 975:. 508:, 497:. 466:. 452:. 397:. 379:, 352:: 61:. 2567:e 2560:t 2553:v 2519:. 2482:. 2452:. 2427:. 2363:. 2337:. 2312:. 2270:. 2243:. 2213:. 2188:. 2162:. 2128:. 2102:. 2059:) 2055:( 2052:. 2024:. 1999:. 1964:. 1900:. 1878:. 1842:. 1829:: 1522:" 1514:" 1502:" 1498:" 1492:" 1488:" 1460:" 1456:" 1446:" 1430:" 1426:" 1420:" 1416:" 1410:" 1406:" 1372:" 1368:" 1362:" 1358:" 1318:" 1314:" 1298:" 1264:" 1260:" 1254:" 1250:" 1244:" 1240:" 1205:" 1193:" 1189:" 1183:" 1179:" 1167:" 1163:" 1157:" 1153:" 1137:" 1133:" 1126:" 1122:" 1096:" 1092:" 1082:" 1066:" 1054:" 1050:" 1036:" 1032:" 768:D 762:A 756:E 750:R 744:D 728:E 719:D 714:) 704:I 697:R 689:T 680:S 323:. 275:. 180:) 174:( 162:) 158:( 144:. 111:) 107:( 94:. 68:) 64:( 20:)

Index

Threat (computer)
improve it
talk page
Learn how and when to remove these messages

quality standards
You can help
talk page
list
prose
converting this article
Editing help
Learn how and when to remove this message
computer security
vulnerability
intentional
accidental
natural disaster
earthquake
fire
tornado
incident
threat actor
exploit
Information assurance
NIST
United States of America
National Information Assurance Glossary
ENISA
The Open Group

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑