Description should include
- understanding that an action might exploit a vulnerability to breach security and cause potential harm
- understanding that threats come from many sources
- email
- social engineering
- insider threats
- network threats
- physical threats such as fire or floods
- threats stemming from software systems or user actions.
Teacher Resource:
CYBER.ORG Cyber Business Module: How Businesses Secure Information