Gain access to thousands of new definitions only available to registered users.
An intentional or unintentional potential event that could compromise the security and integrity of the system. See also vulnerability.
Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.
1. Capabilities, intentions, and attack methods of adversaries to exploit, or any circumstance or event with the potential to cause harm to, information or an information system. [NIS] 2. Any circumstance or event with the potential to harm an information system (IS) through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. [INFOSEC-99] 3. The likelihood of an attack being mounted against a computer system [CESG]. See also: Risk, Vulnerability. 4. A potential violation of security [7498-2]. 5. an action or event that might prejudice security [ITSEC].
Related to Aggro. All enemies (NPCs) maintain a hate list of players that have recently done aggressive actions on it and will attack (Aggro) the target that it considers to be the most threatening.