What Is a Security Threat? | Debricked (2024)

Defining a security threat

Looking in the literature, we can find several definitions of the term. Two rather short and concise can be found in documents from IETF and NIST.

In RFC 4949, IETF defines a threat as

A potential for violation of security, which exists when there is an entity, circ*mstance, capability, action, or event that could cause harm.

RFC 4949

NIST, in SP800-160, defines it as

An event or condition that has the potential for causing asset loss and the undesirable consequences or impact from such loss.

NIST SP800-160

Cyber threats are sometimes incorrectly confused with vulnerabilities. Looking at the definitions, the keyword is “potential”. The threat is not a security problem that exists in an implementation or organization. Instead it is something that can violate the security. This can be compared to a vulnerability which is an actual weakness that can be exploited. The threat always exist, regardless of any countermeasures. However, countermeasures can be used to minimize the probability of it being realized.

Types of security threats

The NIST definition above states that a threat can be an event or a condition. An event, in this case, also includes natural disasters, fire, and power outage. It is a very general concept. In cybersecurity, it is more common to talk about threats such as viruses, trojan horses, denial of service attacks.

Phishing emails is a social engineering threat that can cause, e.g., loss of passwords, credit card numbers and other sensitive data. Threats to information assets can cause loss of confidentiality, integrity or availability of data. This is also known as the CIA triad.

The CIA triad, together with three other well known security concepts, is the basis for the STRIDE threat model. When listing possible threats, it is convenient to use an existing classification as a starting point. STRIDE is the most well-known classification, proposed by Microsoft in 1999. The name comes from the initial letters of the different categories, which also makes it easier to remember them.

ThreatMeaning/ExampleRelated Security Property
Spoofing identityAn example is to use someone else’s password and authenticate as that person.Authentication
Tampering with dataThis includes e.g., modification of data. Either data at rest or data sent over a network.Integrity
RepudiationThis means that users can deny having performed an action, e.g., sending or receiving data.Non-repudiation
Information disclosureThis includes a user reading data without granted access, or eavesdropping a communication channel.Confidentiality
Denial of serviceThis relates to the availability of a systemAvailability
Elevation of privilegeIn these types of threats, a less privileged user gets higher privileges. Normal users obtaining root privileges is the most typical and severe form of thisAuthorization

Examples of security threats

Recall that a threat is very general. It does not include how to realize it, or even if it is possible in the current system. Here are a few examples.

  • A malicious user reads the files of other users.
  • An attacker redirects queries made to a web server to his own web server.
  • An attacker modifies the database.
  • A remote attacker runs commands on the server.

Each of these examples can easily be mapped to a category in STRIDE. Other examples would be malware, trojans and worms.

Related terminology

There are several other terms that are closely related, but that should not be confused by threat.

  • Threat actor or threat agent. This is the entity that carries out and realizes the threat. This is often instead called attacker or adversary when it is carried out by a person or a group. In that case it is also a deliberate action.
  • Threat action. This is the actual attack, or the realization of a threat. It can take advantage of a vulnerability, but in e.g., the case of natural disaster, it does not have to be an underlying vulnerability that causes the threat to be realized.
  • Threat consequence. This is the actual result when the threat is realized. RFC 4949 lists four main categories of consequences, namely “unauthorized disclosure”, “deception”, “disruption”, and “usurpation”.
What Is a Security Threat? | Debricked (2024)
Top Articles
Former Nine-Term Congressman Sentenced To Nearly 2 Years In Prison For Insider Trading, Report Says
Is Insider Trading Legal For Congress?
The Tribes and Castes of the Central Provinces of India, Volume 3
Fighter Torso Ornament Kit
Fat People Falling Gif
Farepay Login
Blanchard St Denis Funeral Home Obituaries
Culver's Flavor Of The Day Wilson Nc
Craigslist Free Stuff Appleton Wisconsin
What Auto Parts Stores Are Open
The Idol - watch tv show streaming online
Espn Expert Picks Week 2
The Blind Showtimes Near Showcase Cinemas Springdale
World Cup Soccer Wiki
Enderal:Ausrüstung – Sureai
A Guide to Common New England Home Styles
Lima Funeral Home Bristol Ri Obituaries
How pharmacies can help
Nurse Logic 2.0 Testing And Remediation Advanced Test
Riherds Ky Scoreboard
Baja Boats For Sale On Craigslist
Craigslist St. Cloud Minnesota
Ou Class Nav
Disputes over ESPN, Disney and DirecTV go to the heart of TV's existential problems
Craigslist Wilkes Barre Pa Pets
Tokyo Spa Memphis Reviews
A Christmas Horse - Alison Senxation
Evil Dead Rise Ending Explained
Ordensfrau: Der Tod ist die Geburt in ein Leben bei Gott
031515 828
Evil Dead Rise - Everything You Need To Know
Publix Daily Soup Menu
Ultra Clear Epoxy Instructions
Gabrielle Enright Weight Loss
Flashscore.com Live Football Scores Livescore
Pawn Shop Open Now
159R Bus Schedule Pdf
Topos De Bolos Engraçados
Davis Fire Friday live updates: Community meeting set for 7 p.m. with Lombardo
Lima Crime Stoppers
Zeeks Pizza Calories
Theatervoorstellingen in Nieuwegein, het complete aanbod.
Www.homedepot .Com
1990 cold case: Who killed Cheryl Henry and Andy Atkinson on Lovers Lane in west Houston?
German American Bank Owenton Ky
What Does the Death Card Mean in Tarot?
Santa Ana Immigration Court Webex
Diablo Spawns Blox Fruits
Amourdelavie
Syrie Funeral Home Obituary
Koniec veľkorysých plánov. Prestížna LEAF Academy mení adresu, masívny kampus nepostaví
Salem witch trials - Hysteria, Accusations, Executions
Latest Posts
Article information

Author: Msgr. Benton Quitzon

Last Updated:

Views: 6143

Rating: 4.2 / 5 (43 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.