Back

threat

1. Capabilities, intentions, and attack methods of adversaries to exploit, or any circumstance or event with the potential to cause harm to, information or an information system. [NIS] 2. Any circumstance or event with the potential to harm an information system (IS) through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. [INFOSEC-99]3. The likelihood of an attack being mounted against a computer system [CESG].See also: Risk, Vulnerability.4.A potential violation of security [7498-2].5.an action or event that might prejudice security[ITSEC].