Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

Threats, Vulnerabilities, and

Impact
Threats are attempts to exploit vulnerabilities that result in the loss of confidentiality,
integrity, or availability of a business asset.
The protection of confidentiality, integrity, and availability are common security objectives
for information systems.

Figure 1.2 shows these three security objectives as a protective triangle. If any side of the
triangle is breached or fails, security fails.

In other words, risks to confidentiality ,integrity , or availability represent potential loss to


an organization. Because of this, a significant amount of risk management is focused on
protecting these resources.
Risk Assessment cont….
Risk management techniques

You might also like