APPENDIX B TYPICAL THREATS AND HAZARDS

Threats and hazards cause impacts or consequences to occur on one or more assets by taking advantage of one or more vulnerabilities. Figure B.1 may not be exhaustive, but should provide a starting point.

MALICIOUS INTRUSION (HACKING)

Hacking is a generic term applied to many forms of unpleasant behaviour, although it began as a description of what people did in order to find out how computers worked and how to improve their performance. Hacking almost invariably results in a breach of confidentiality, integrity or availability as hackers use software tools to intercept and decrypt legitimate information, and either steal it or change it.

Since the introduction of the CMA in 1990, hacking is now treated ...

Get Information Risk Management: A practitioner’s guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.