-
Threats can come from an individual, a group of individuals, or an organiseation.
-
A threat to a computing device is any action, either accidental or malicious, that can have a negative effect on the assets and resources of an individual or organiseation.
-
The asset might be hardware/software, databases, files, data, or the physical network itself.