IT:AD:Threat Assessment

  • Threat/'s are the foreign agents, pirates, twits, and disgruntled employees trying to get into the system.
  • Vulnerability/: are the weaknesses of the system they're looking for in order to gain unauthorised access.
  • Risk/: risks are where Threats and Vulnerabilities can overlap.
  • Exploits/: are the mechanism they used to take advantage of the Vulnerability.

The weakness of the system. Doesn't mean it's been yet exploited by a Threat/ (the Risk/ is where the two can overlap).