Professional Documents
Culture Documents
Threats, Vulnerabilities, and Impact-Chapter1
Threats, Vulnerabilities, and Impact-Chapter1
Impact
Threats are attempts to exploit vulnerabilities that result in the loss of confidentiality,
integrity, or availability of a business asset.
The protection of confidentiality, integrity, and availability are common security objectives
for information systems.
Figure 1.2 shows these three security objectives as a protective triangle. If any side of the
triangle is breached or fails, security fails.