2
Most read
3
Most read
Threat
Asset
Attack
Risk
Vulnerability
Osama ellahi
significantbyte.com
Threat
Threat is a potential cause of an
incident that may result in loss or
physical damage to the computer
systems.
OR
A threat is what we’re trying to
protect against.
OR
Anything that can exploit a
vulnerability, intentionally or
accidentally, and obtain, damage, or
destroy an asset.
Natural Threats
such as floods,
hurricanes, or
tornadoes
Unintentional
threats
like an employee
mistakenly accessing
the wrong
information
Intentional threats
such as spyware,
malware, adware
companies, or the
actions of a
disgruntled
employee
2
Asset
People
People may include
employees and
customers along with
other invited persons
such as contractors or
guests
Property
Property assets consist
of both tangible and
intangible items that
can be assigned a
value.
Intangible assets
include reputation and
proprietary
information. It may
include databases,
software code, critical
company records, and
many other intangible
items.
1 2 3
Asset is what we are trying to
protect.
3
Attack
Act or action that exploits
vulnerability (i.e., an identified
weakness) in controlled system
OR
Accomplished by threat agent
which damages or steals
organization’s information
Active attacks
attempts to alter system resources
or effect their operations
Passive attacks
attempts to learn or make use of
information from the system
but does not affect system
resources
4
Vulnerability
Bugs
5
Weak credentials Unpatched software
Weaknesses or gaps in a security
program that can be exploited by
threats to gain unauthorized
access to an asset.
OR
A vulnerability is a weakness or
gap in our protection efforts.
Reasons of vulnerability 
Malicious InsiderMissing data
encryption.
Phishing, Web &
Ransomware
Risk
The potential for loss, damage or
destruction of an asset as a result
of a threat exploiting a
vulnerability.
OR
Risk is the intersection of assets,
threats, and vulnerabilities.
6
New incident
has potential
to harm a
system
Known
weakness of
an asset that
hackers could
exploit
The potential
of loss or
damage when
a threat
exploit a
vulnerability
References
1. http://significantbyte.com/posts/106
2. https://www.threatanalysis.com/2010/05/03/threat-vulnerability-risk-
commonly-mixed-up-
terms/#:~:text=A%20threat%20is%20what%20we,unauthorized%20access
%20to%20an%20asset.&text=Risk%20%E2%80%93%20The%20potential%
20for%20loss,a%20threat%20exploiting%20a%20vulnerability.
3. https://securityboulevard.com/2020/05/the-9-types-of-security-
vulnerabilities/
4. https://www.bmc.com/blogs/security-vulnerability-vs-threat-vs-risk-whats-
difference/
5. https://www.logixconsulting.com/2020/01/17/cyber-threat-vs-vulnerability-
vs-risk/
6. https://www.threatanalysis.com/2010/05/03/threat-vulnerability-risk-
commonly-mixed-up-
terms/#:~:text=Risk%20is%20the%20intersection%20of%20assets%2C%20
threats%2C%20and%20vulnerabilities.&text=You%20see%2C%20when%20
conducting%20a,%2B%20Threat%20%2B%20Vulnerability%20%3D%20Ris
k.
7. https://www.techopedia.com/definition/6060/attack
8. https://www.geeksforgeeks.org/active-and-passive-attacks-in-information-
security/
9. https://blog.logsign.com/what-are-the-types-of-cyber-security-
vulnerabilities/
7

More Related Content

PPS
Physical security.ppt
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPT
Indian perspective of cyber security
PPTX
Physical Security Assessment
PPTX
Chapter 11: Information Security Incident Management
PDF
Ceh v5 module 10 session hijacking
PDF
Types of Threat Actors and Attack Vectors
Physical security.ppt
Cybersecurity Attack Vectors: How to Protect Your Organization
Indian perspective of cyber security
Physical Security Assessment
Chapter 11: Information Security Incident Management
Ceh v5 module 10 session hijacking
Types of Threat Actors and Attack Vectors

What's hot (20)

PDF
Malware and security
PDF
Threat hunting 101 by Sandeep Singh
PDF
Maturity Model of Security Disciplines
PDF
Overview of the Cyber Kill Chain [TM]
PPTX
What is Threat Hunting? - Panda Security
PPT
Basics of Information System Security
PPTX
kill-chain-presentation-v3
PDF
Building Security Operation Center
PDF
Security Awareness Training
PPTX
Cybersecurity
PDF
Cyber Security
PPTX
Xss attack
PPT
Asset, Vulnerability, Threat, Risk & Control
PPTX
Physical security
PPSX
8 Access Control
PDF
Cybersecurity 101 - Auditing Cyber Security
PPTX
Web application security
PPTX
Operational Security
PPTX
Cyber Threat Intelligence
PPTX
Introduction to SOC
Malware and security
Threat hunting 101 by Sandeep Singh
Maturity Model of Security Disciplines
Overview of the Cyber Kill Chain [TM]
What is Threat Hunting? - Panda Security
Basics of Information System Security
kill-chain-presentation-v3
Building Security Operation Center
Security Awareness Training
Cybersecurity
Cyber Security
Xss attack
Asset, Vulnerability, Threat, Risk & Control
Physical security
8 Access Control
Cybersecurity 101 - Auditing Cyber Security
Web application security
Operational Security
Cyber Threat Intelligence
Introduction to SOC
Ad

Similar to Threat vs risk vs attack vs Asset vs vulnerability (20)

PPTX
lect 5.pptx74564565444674345-753467545674
PDF
BCS ITNow 201406 - The Risk Business
PDF
Justifying IT Security: Managing Risk
PDF
Understanding the Difference Between a Vulnerability, Threat, and Risk in Cyb...
PPSX
Asset, Threat, Vulnerability, Risk
PPTX
PPT0-Computer Security Concepts.pptx
PPT
PPTX
Cyber Security # Lec 3
PPT
Lecture1 intro to cs
ODP
Network Security Topic 1 intro
PPTX
3-UnitV_security.pptx
PPTX
Information security FundameFundamentals.pptx
PDF
Ch07 Managing Risk
PDF
Chapter 4 vulnerability threat and attack
PPT
Information security introduction
PPT
Chapter 1 overview
PPTX
Iso27001 Risk Assessment Approach
PPTX
MIS: Information Security Management
PDF
Risk Assessments
DOCX
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
lect 5.pptx74564565444674345-753467545674
BCS ITNow 201406 - The Risk Business
Justifying IT Security: Managing Risk
Understanding the Difference Between a Vulnerability, Threat, and Risk in Cyb...
Asset, Threat, Vulnerability, Risk
PPT0-Computer Security Concepts.pptx
Cyber Security # Lec 3
Lecture1 intro to cs
Network Security Topic 1 intro
3-UnitV_security.pptx
Information security FundameFundamentals.pptx
Ch07 Managing Risk
Chapter 4 vulnerability threat and attack
Information security introduction
Chapter 1 overview
Iso27001 Risk Assessment Approach
MIS: Information Security Management
Risk Assessments
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
Ad

Recently uploaded (20)

PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Modernising the Digital Integration Hub
PPT
What is a Computer? Input Devices /output devices
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
1 - Historical Antecedents, Social Consideration.pdf
Hindi spoken digit analysis for native and non-native speakers
Consumable AI The What, Why & How for Small Teams.pdf
CloudStack 4.21: First Look Webinar slides
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
UiPath Agentic Automation session 1: RPA to Agents
Taming the Chaos: How to Turn Unstructured Data into Decisions
A contest of sentiment analysis: k-nearest neighbor versus neural network
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Modernising the Digital Integration Hub
What is a Computer? Input Devices /output devices
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Enhancing emotion recognition model for a student engagement use case through...
NewMind AI Weekly Chronicles – August ’25 Week III
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Module 1.ppt Iot fundamentals and Architecture
Developing a website for English-speaking practice to English as a foreign la...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
The influence of sentiment analysis in enhancing early warning system model f...
1 - Historical Antecedents, Social Consideration.pdf

Threat vs risk vs attack vs Asset vs vulnerability

  • 2. Threat Threat is a potential cause of an incident that may result in loss or physical damage to the computer systems. OR A threat is what we’re trying to protect against. OR Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset. Natural Threats such as floods, hurricanes, or tornadoes Unintentional threats like an employee mistakenly accessing the wrong information Intentional threats such as spyware, malware, adware companies, or the actions of a disgruntled employee 2
  • 3. Asset People People may include employees and customers along with other invited persons such as contractors or guests Property Property assets consist of both tangible and intangible items that can be assigned a value. Intangible assets include reputation and proprietary information. It may include databases, software code, critical company records, and many other intangible items. 1 2 3 Asset is what we are trying to protect. 3
  • 4. Attack Act or action that exploits vulnerability (i.e., an identified weakness) in controlled system OR Accomplished by threat agent which damages or steals organization’s information Active attacks attempts to alter system resources or effect their operations Passive attacks attempts to learn or make use of information from the system but does not affect system resources 4
  • 5. Vulnerability Bugs 5 Weak credentials Unpatched software Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. OR A vulnerability is a weakness or gap in our protection efforts. Reasons of vulnerability  Malicious InsiderMissing data encryption. Phishing, Web & Ransomware
  • 6. Risk The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. OR Risk is the intersection of assets, threats, and vulnerabilities. 6 New incident has potential to harm a system Known weakness of an asset that hackers could exploit The potential of loss or damage when a threat exploit a vulnerability
  • 7. References 1. http://significantbyte.com/posts/106 2. https://www.threatanalysis.com/2010/05/03/threat-vulnerability-risk- commonly-mixed-up- terms/#:~:text=A%20threat%20is%20what%20we,unauthorized%20access %20to%20an%20asset.&text=Risk%20%E2%80%93%20The%20potential% 20for%20loss,a%20threat%20exploiting%20a%20vulnerability. 3. https://securityboulevard.com/2020/05/the-9-types-of-security- vulnerabilities/ 4. https://www.bmc.com/blogs/security-vulnerability-vs-threat-vs-risk-whats- difference/ 5. https://www.logixconsulting.com/2020/01/17/cyber-threat-vs-vulnerability- vs-risk/ 6. https://www.threatanalysis.com/2010/05/03/threat-vulnerability-risk- commonly-mixed-up- terms/#:~:text=Risk%20is%20the%20intersection%20of%20assets%2C%20 threats%2C%20and%20vulnerabilities.&text=You%20see%2C%20when%20 conducting%20a,%2B%20Threat%20%2B%20Vulnerability%20%3D%20Ris k. 7. https://www.techopedia.com/definition/6060/attack 8. https://www.geeksforgeeks.org/active-and-passive-attacks-in-information- security/ 9. https://blog.logsign.com/what-are-the-types-of-cyber-security- vulnerabilities/ 7