What Is a Security Threat? | Debricked (2024)

Defining a security threat

Looking in the literature, we can find several definitions of the term. Two rather short and concise can be found in documents from IETF and NIST.

In RFC 4949, IETF defines a threat as

A potential for violation of security, which exists when there is an entity, circ*mstance, capability, action, or event that could cause harm.

RFC 4949

NIST, in SP800-160, defines it as

An event or condition that has the potential for causing asset loss and the undesirable consequences or impact from such loss.

NIST SP800-160

Cyber threats are sometimes incorrectly confused with vulnerabilities. Looking at the definitions, the keyword is “potential”. The threat is not a security problem that exists in an implementation or organization. Instead it is something that can violate the security. This can be compared to a vulnerability which is an actual weakness that can be exploited. The threat always exist, regardless of any countermeasures. However, countermeasures can be used to minimize the probability of it being realized.

Types of security threats

The NIST definition above states that a threat can be an event or a condition. An event, in this case, also includes natural disasters, fire, and power outage. It is a very general concept. In cybersecurity, it is more common to talk about threats such as viruses, trojan horses, denial of service attacks.

Phishing emails is a social engineering threat that can cause, e.g., loss of passwords, credit card numbers and other sensitive data. Threats to information assets can cause loss of confidentiality, integrity or availability of data. This is also known as the CIA triad.

The CIA triad, together with three other well known security concepts, is the basis for the STRIDE threat model. When listing possible threats, it is convenient to use an existing classification as a starting point. STRIDE is the most well-known classification, proposed by Microsoft in 1999. The name comes from the initial letters of the different categories, which also makes it easier to remember them.

ThreatMeaning/ExampleRelated Security Property
Spoofing identityAn example is to use someone else’s password and authenticate as that person.Authentication
Tampering with dataThis includes e.g., modification of data. Either data at rest or data sent over a network.Integrity
RepudiationThis means that users can deny having performed an action, e.g., sending or receiving data.Non-repudiation
Information disclosureThis includes a user reading data without granted access, or eavesdropping a communication channel.Confidentiality
Denial of serviceThis relates to the availability of a systemAvailability
Elevation of privilegeIn these types of threats, a less privileged user gets higher privileges. Normal users obtaining root privileges is the most typical and severe form of thisAuthorization

Examples of security threats

Recall that a threat is very general. It does not include how to realize it, or even if it is possible in the current system. Here are a few examples.

  • A malicious user reads the files of other users.
  • An attacker redirects queries made to a web server to his own web server.
  • An attacker modifies the database.
  • A remote attacker runs commands on the server.

Each of these examples can easily be mapped to a category in STRIDE. Other examples would be malware, trojans and worms.

Related terminology

There are several other terms that are closely related, but that should not be confused by threat.

  • Threat actor or threat agent. This is the entity that carries out and realizes the threat. This is often instead called attacker or adversary when it is carried out by a person or a group. In that case it is also a deliberate action.
  • Threat action. This is the actual attack, or the realization of a threat. It can take advantage of a vulnerability, but in e.g., the case of natural disaster, it does not have to be an underlying vulnerability that causes the threat to be realized.
  • Threat consequence. This is the actual result when the threat is realized. RFC 4949 lists four main categories of consequences, namely “unauthorized disclosure”, “deception”, “disruption”, and “usurpation”.
What Is a Security Threat? | Debricked (2024)
Top Articles
The Latest Rules Of Tipping: How Much To Tip In 2023 | Bankrate
Private equity - British Business Bank
Friskies Tender And Crunchy Recall
Umbc Baseball Camp
Swimgs Yuzzle Wuzzle Yups Wits Sadie Plant Tune 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Autumns Cow Dog Pig Tim Cook’s Birthday Buff Work It Out Wombats Pineview Playtime Chronicles Day Of The Dead The Alpha Baa Baa Twinkle
Live Basketball Scores Flashscore
Coverage of the introduction of the Water (Special Measures) Bill
9192464227
Die Windows GDI+ (Teil 1)
Craigslist Nj North Cars By Owner
Produzione mondiale di vino
Conduent Connect Feps Login
Obituary | Shawn Alexander | Russell Funeral Home, Inc.
Pittsburgh Ultra Advanced Stain And Sealant Color Chart
Uhcs Patient Wallet
Playgirl Magazine Cover Template Free
Curtains - Cheap Ready Made Curtains - Deconovo UK
Xxn Abbreviation List 2023
Sport-News heute – Schweiz & International | aktuell im Ticker
25Cc To Tbsp
Pekin Soccer Tournament
Officialmilarosee
Puss In Boots: The Last Wish Showtimes Near Cinépolis Vista
Raz-Plus Literacy Essentials for PreK-6
R. Kelly Net Worth 2024: The King Of R&B's Rise And Fall
Academy Sports Meridian Ms
Nesb Routing Number
Essence Healthcare Otc 2023 Catalog
Expression Home XP-452 | Grand public | Imprimantes jet d'encre | Imprimantes | Produits | Epson France
Stockton (California) – Travel guide at Wikivoyage
950 Sqft 2 BHK Villa for sale in Devi Redhills Sirinium | Red Hills, Chennai | Property ID - 15334774
Funky Town Gore Cartel Video
Rays Salary Cap
Bfri Forum
Mumu Player Pokemon Go
Kokomo Mugshots Busted
Craigslist In Myrtle Beach
Samsung 9C8
Labyrinth enchantment | PoE Wiki
What Does Code 898 Mean On Irs Transcript
Wayne State Academica Login
Dcilottery Login
VDJdb in 2019: database extension, new analysis infrastructure and a T-cell receptor motif compendium
Powerspec G512
The Many Faces of the Craigslist Killer
A rough Sunday for some of the NFL's best teams in 2023 led to the three biggest upsets: Analysis
Kaamel Hasaun Wikipedia
Aurora Southeast Recreation Center And Fieldhouse Reviews
Mail2World Sign Up
300 Fort Monroe Industrial Parkway Monroeville Oh
Southwind Village, Southend Village, Southwood Village, Supervision Of Alcohol Sales In Church And Village Halls
Craigs List Sarasota
Latest Posts
Article information

Author: Msgr. Benton Quitzon

Last Updated:

Views: 6143

Rating: 4.2 / 5 (43 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.