any circumstance or event with the potential to cause harm to a system [DoD 00
Any capability, circumstance, or event with the potential to cause harm to a TAIS in the form of destruction, unauthorized disclosure, modification of data, or denial of service.
A declaration of an intention or a determination to inflict harm on another in response to an individual taking or refusing to take action.
A potential cause of an unwanted event which may result in harm to an organization and its assets.
a statement of an intention to hurt, punish, or cause pain back
An avowed present determination or intent to injure the person, property, or reputation of another presently or in the future.
The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. A potential violation of security.
A circumstance or event with the potential to cause harm to a system, including the destruction, unauthorized disclosure, or modification of data and/or denial of service.
something that is a source of danger; "earthquakes are a constant threat in Japan"
declaration of an intention or a determination to inflict harm on another; "his threat to kill me was quite explicit"
a communication of a intent or willingness and ability to violate the right of another
a costly event that has some small probability of occurring
a danger which which could affect the security (confidentiality, integrity, availability) of assets, leading to a potential loss or damage
a harmful act such as the deployment of a virus or illegal network penetration
an action or event that could cause some form of damage to your business
an action or tool which can exploit and expose a vulnerability and therefore compromise the integrity of a given system
an adverse occurrence that allows someone to do harm to you or your assets
an agent, or party, who wants to and can inflict damage
an entity or event with the potential to harm the system
an event or activity that can cause harm to an asset
an event, process, activity, or action that exploits a vulnerability to attack an asset
an exaggerated statement of impending harm that parents use to intimidate or terrorize a child, e
an expression of an intention to inflict evil, injury, or damage on another
an expression of intent to do harm or act out violently against someone or something
a party with the capabilities and intentions to exploit a vulnerability in an asset
a possible danger that might exploit a TOE vulnerability
a possible danger to the system, such as a spy or computer hackers
a potential danger to an asset
a potential undesirable incident
a situation, an activity or an event, which increases the complexity of the operation and poses a safety risk to personnel, customers or equipment or poses a risk that the result of our labor may not meet the standard expected by our customers
a situation in which someone or something deliberately compromises confidentiality, integrity or availability
a stimulus that may signal the risk of future harm to the system
a theoretical value describing a theoretical danger
an expression of an intention to inflict pain, injury, evil, or punishment
An indication of possible violence, harm, or danger.
Any item that has the potential to compromise the integrity, confidentiality, and availability of data.
Capabilities, intentions, and attack methods of adversaries to exploit, damage, or alter or any circumstance or event with the potential to cause harm to information or an information system.
an event or outcome that may potentially or actually occur as a result of the exploitation of a vulnerability.
(menace) - This is any potential event or act that could cause one or more of the following to occur: unauthorized disclosure, destruction, removal, modification, or interruption of sensitive information, assets, or services, or injury to people. A threat may be deliberate or accidental.
Any circumstance or event with the potential to adversely impact an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.
any event that may harm a system by means of destruction, disclosure, modification of data, and/or denial of service.
A potential for violation of security.
The capability of an adversary coupled with his intentions to undertake any actions detrimental to the success of program activities or operations.
an activity, deliberate or unintentional, with the potential for causing harm to an automated information system or activity.
( menace) - any potential event or act, deliberate or accidental, that could cause injury to employees or assets.
The sum of the potential strengths, capabilities, and intentions of any enemy which can limit or negate mission accomplishment or reduce force, system, or equipment effectiveness.
A threat is an unwanted event, or the possibility of an event, that can cause harm to the system.
An event, process, activity (act), substance, or quality of being perpetuated by one or more threat agents, which, when realized, has an adverse effect on organization assets, resulting in losses attributed to:-Direct loss -Related direct loss -Delays or denials -Disclosure of sensitive information -Modification of programs or data bases -Intangible, i.e., good will, reputation, etc.
As defined by [CERT 1993] "any circumstances or event that has the potential to cause harm to a system or network." That means, that even the existence of an unknown vulnerability implies a threat by definition.
Any indication, circumstance, or event with the potential to cause loss of, or damage to an asset.
Threat refers to a potential cause of an unwanted event, which may result in harm to an organization.
A threat is a declaration of intention to inflict punishment or harm on another. It will often be conditional upon a particular course of action on the part of the recipient.