Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337516938
Author: WHITMAN
Publisher: Cengage
Question
Book Icon
Chapter 2, Problem 3CEDQ
Program Plan Intro

Threat:

It is the action that is dangerous and may misuse a vulnerability which leads to some harmful consequences. Threat may be accidental, intentional or can be an event, circumstance or capability.

Blurred answer
Students have asked these similar questions
How does one go about developing a threat model?
The corporation has assigned you the task of developing a plan to mitigate potential threats. The CEO has requested you to explain in a few words the relationship between influence, threat, and exposure. Make a single, succinct phrase that describes the connection.
Which of the following is the best description of purpose of risk management? a. To implement measures to reduce risks to an acceptable level. b. To outline the threats to which IT resources are exposed. c. To determine the damage caused by possible security incidents. d. To determine the probability that a certain risk will occur.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,