Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.
- Browse Related Terms: Common Vulnerabilities and Exposures (CVE), CVE, IT-Related Risk, Remediation Plan, system integrity, Threat, Threat Agent/Source, Threat Analysis, Threat Assessment, Threat Source, Total Risk, Vulnerability, Vulnerability Assessment
An intentional or unintentional potential event that could compromise the security and integrity of the system. See also vulnerability.
- Browse Related Terms: Attempt, Challenge Response, Identity Governance, Identity Management, Impostor, Liveness Detection, Mimic, Population, Spoofing, Threat, Vulnerability
Also listed in: