Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Threat

Safety and Security Issues in Technical Infrastructures
Potential cause of an unwanted incident, which may result in harm to individuals, assets, a system or organization, the environment or the community.
Published in Chapter:
Cyber-Physical Security in Healthcare
Vasiliki Mantzana (Center for Security Studies (KEMEA), Greece), Eleni Darra (Center for Security Studies (KEMEA), Greece), and Ilias Gkotsis (Center for Security Studies (KEMEA), Greece)
Copyright: © 2020 |Pages: 25
DOI: 10.4018/978-1-7998-3059-7.ch003
Abstract
The healthcare sector has been considered a part of critical infrastructure (CI) of society and has faced numerous physical-cyber threats that affect citizens' lives and habits, increase their fears, and influence hospital services provisions. The two most recent ransomware campaigns, WannaCry and Petya, have both managed to infect victims' systems by exploiting existing unpatched vulnerabilities. It is critical to develop an integrated approach in order to fight against combination of physical and cyber threats. In this chapter, key results of the SAFECARE project (H2020-GA787005), which aims is to provide solutions that will improve physical and cyber security, to prevent and detect complex attacks, to promote incident responses and mitigate impacts, will be presented. More specifically, healthcare critical asset vulnerabilities; cyber-physical threats that can affect them; architecture solutions, as well as, some indicative scenarios that will be validated during the project will be presented.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
“Type Amen” or Perish!: Religious Deception on Facebook
An expression of fear or indication of imminent danger.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policies: Precepts and Practices
is an event or activity, deliberate or unintentional, with the potential for causing harm to an IT system or activity.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Risk Management in the European Union
A potential cause unwanted incidents that may result in damage to the mission of a system or an entire organization. Security threats can be accidental or deliberate (malicious) and are characterized by elements of threat, attack method, and the goods subject to the threat.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Terrorism Attack: Types, Effects, and Prevention
Anything that can cause damage or harm the system or the network. It is only a warning and it does not mean the happening of the event. It only hints at the happening of the impending danger.
Full Text Chapter Download: US $37.50 Add to Cart
Taxonomy of Login Attacks in Web Applications and Their Security Techniques Using Behavioral Biometrics
Full Text Chapter Download: US $37.50 Add to Cart
Answering the New Realities of Stalking
A declaration of the intention to inflict harm, pain or misery.
Full Text Chapter Download: US $37.50 Add to Cart
Implementing a Sound Public Information Security Program
A threat is any circumstance or event with potential cause for harm to a system in the form of destruction, disclosure, modification of data, and/or denial of service. It is the potential for the exploitation of a vulnerability. Threats arise from internal failures, human errors, attacks, and natural catastrophes. The examination of all actions and events that might adversely affect a system or operation is known as threat analysis.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Enterprise Information System Security: A Life-Cycle Approach
Threats are any unwanted activities or events that under certain conditions could jeopardize either the integrity, confidentiality or availability of information and other assets.
Full Text Chapter Download: US $37.50 Add to Cart
Cost Estimation and Security Investment of Security Projects
Is an indication about a potential event that can harm the security of the protected resource. A threat can turn to a security attack once a vulnerability that can be exploited is found.
Full Text Chapter Download: US $37.50 Add to Cart
Making Sense of Journalists' Safety and Media Freedom in Egypt Between Different Types of Threats and the Ruling Legislative Context: Multi-Analytical study
An intimidating or dangerous warning targeted at a practicing journalist to silence him or her from carrying out his or her professional duty because it is unfavorable to the person, group, or organization issuing the threat or against their benefits.
Full Text Chapter Download: US $37.50 Add to Cart
Strategies to Combat Cyberattacks: A Systematic Review
Risk that the Information system encountered.
Full Text Chapter Download: US $37.50 Add to Cart
Threat Modeling and Secure Software Engineering Process
Any circumstance or event with the potential to cause harm to a software program or the tasks it is designed to perform.
Full Text Chapter Download: US $37.50 Add to Cart
Business Continuity of Critical Infrastructures for Safety and Security Incidents
A cause of an incident/event (mostly man-made) with negative impact on the activities of an infrastructure
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Risk Management
The potential for some damage or trouble to an organization’s information technology environment.
Full Text Chapter Download: US $37.50 Add to Cart
Requirements and Life Cycle Model-Based Assessment of NPP I&C Systems Cyber Security and Safety
Any circumstance or event with the potential to adversely impact agency operations (including mission, functions, image, or reputation), agency assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Management and Cost Estimation of Security Projects
Indication about a potential event that can harm the security of the protected resource. A threat can turn to a security attack once a vulnerability that can be exploited is found.
Full Text Chapter Download: US $37.50 Add to Cart
Advances in Fault-Tolerant Multi-Agent Systems
There are three types of threats ( Avižienis et al., 2004 ): a failure is an event that occurs when the system (or service) behavior deviates from its specification; an error is a system state which is liable to lead to a failure; and the underlying cause of an error is a fault .
Full Text Chapter Download: US $37.50 Add to Cart
The International Experience in Security Risk Analysis Methods
A potential cause unwanted incidents that may result in damage to the mission of a system or an entire organization. Security threats can be accidental or deliberate (malicious) and are characterized by elements of threat, attack method, and the goods subject to the threat.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Architecture for Cloud Environment
A possible danger that might exploit a vulnerability to breach security and thus cause possible harm.
Full Text Chapter Download: US $37.50 Add to Cart
Threats and Vulnerabilities of Mobile Applications
The uninterpreted event that causes a risk that leads to loss.
Full Text Chapter Download: US $37.50 Add to Cart
The 3D IFB SWOT Analysis as a Strategic Tool to Develop Entrepreneurial Plans for Family Businesses
Element, aspect, or fact in the external environment that prevents or opposes to attain a goal or objective; it hurts and produces a disadvantage.
Full Text Chapter Download: US $37.50 Add to Cart
The Role of the International Community in Turning Afghanistan Into a Failed State and Its Impact on International and Regional Security
Verbal, written, or otherwise expressed intent to cause military, physical, material, or any other harm to any person, society, or state.
Full Text Chapter Download: US $37.50 Add to Cart
Classification of Spamming Attacks to Blogging Websites and Their Security Techniques
The possibility of malicious attempt to damage or disrupt a computer or system.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Privacy of Information and Data: Policies, Threats, and Solutions
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security Assessment of NPP I&C Systems
Potential cause of an unwanted incident, which may result in harm to a system or organization.
Full Text Chapter Download: US $37.50 Add to Cart
Threat Detection in Cyber Security Using Data Mining and Machine Learning Techniques
Any entity that can exploit a vulnerability to cause harm to cyber infrastructure.
Full Text Chapter Download: US $37.50 Add to Cart
Fear Appeals, Threat Perceptions, and Protection Motivation in Information Systems Security
In the context of IS security is a possibility of situation that could potentially take advantage of a vulnerability in order to compromise an information system, data or information assets or cause damage.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
A threat is understood to be any action that tends to be harmful. It triggers a security incident that can eventually lead to material damage or immaterial loss of assets.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Crime and Victimization in Cyberspace: A Socio-Criminological Approach to Cybercrime
In computer science is a set of circumstances that can potentially damage a system, a device or a network.
Full Text Chapter Download: US $37.50 Add to Cart
A Hybrid Asset-Based IT Risk Management Framework
Potential hazard that can partially or totally interrupt the operation of systems, processes and other information system components.
Full Text Chapter Download: US $37.50 Add to Cart
Security Awareness in the Internet of Everything
An intent to cause harm to an individual, a group of people, to steal or to damage property, to manipulate the system, to disrupt or to halt services, motivated by a value of the assets in question.
Full Text Chapter Download: US $37.50 Add to Cart
Information Systems Risk Management: An Audit and Control Approach
Threat is the potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.
Full Text Chapter Download: US $37.50 Add to Cart
National Security Policy and Strategy and Cyber Security Risks
A circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact (create adverse consequences for) organizational operations, organizational assets (including information and information systems), individuals, other organizations, or society.
Full Text Chapter Download: US $37.50 Add to Cart
Silencing the Media and Chaining the Watchdog: Threats to Journalist Safety During Elections in Nigeria
An intimidating, hazardous, menacing, perilous, harmful, harassing or dangerous warning targeted at a practicing journalist to silence him or her from carrying out his or her professional duty because it is unfavorable to the person, group or organization issuing the threat.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR