cyber security training

Cybersecurity Threats and Vulnerabilities: List Edition

An essential part of risk management is identifying and examining threats to better assist senior management with creating or updating security policies within the organization.

Below is a (live) list of possible threats to an organization. This can be used as an additional checklist to make sure virtually all areas contain safeguards where needed.

  • Viruses
  • Cascade errors
  • Criminal activities by authorized users (espionage, IP theft, embezzlement, etc.)
  • Movement (vibrations, jarring, etc.)
  • Intentional attacks
  • Reorganization
  • Authorized user illness or epidemics
  • Malicious hackers
  • Disgruntled employees
  • User errors
  • Natural disasters
  • Physical damage
  • Misuse of data, resources, services
  • Changes to data classification or security policies
  • Compromises to data classification or security policies
  • Government, political, or military intrusions, restrictions
  • Processing errors (buffer overflows)
  • Personnel privilege abuse
  • Temperature extremes
  • Energy anomalies (static, EM pulses, radio frequencies, power loss, power surge, etc.)
  • Loss of data
  • Information warefare
  • Bankruptcy or alteration/interuption of business activity
  • Coding/programming errors
  • Intruders(physical or logical)
  • Environmental factors (presence of gasses, liquids, organisms, etc.)
  • Equipment failure
  • Physical theft
  • Social engineering

Similar Posts