IT:AD:Threat Assessment
Summary
- Threat/'s are the foreign agents, pirates, twits, and disgruntled employees trying to get into the system.
- Vulnerability/: are the weaknesses of the system they're looking for in order to gain unauthorised access.
- Risk/: risks are where Threats and Vulnerabilities can overlap.
- Exploits/: are the mechanism they used to take advantage of the Vulnerability.
The weakness of the system. Doesn't mean it's been yet exploited by a Threat/ (the Risk/ is where the two can overlap).