-
Threats can come
from an individual
, a group
of individuals, or an organiseation
.
-
A threat to a computing device is any action
, either accidental
or
malicious
, that can have a negative
effect on the assets
and resources of an individual or organiseation.
-
The asset might be hardware/software
, databases, files, data, or the physical network itself.