Are events or circumstances that have the potential to adversely affect operations and assets?

accuracy An attribute of information that describes how data is free of errors and has the value that the user expects.

authenticity An attribute of information that describes how data is genuine or original rather than reproduced or fabricated.

availability An attribute of information that describes how data is accessible and correctly formatted for use without interference or obstruction.

confidentiality An attribute of information that describes how data is protected from disclosure
or exposure to unauthorized individuals or systems.

integrity An attribute of information that describes how data is whole, complete, and uncorrupted.
personally identifiable information (PII) A set of information that could uniquely identify an individual.

possession An attribute of information that describes how the data's ownership or control is legitimate or authorized.

utility An attribute of information that describes how data has value or usefulness for an end purpose.

Is a potential weakness in an asset or its defensive control?

As discussed in a previous lecture, a vulnerability is a potential weakness in an asset, it's media or it's defensive control systems.

What is meant by security threats?

A security threat is a malicious act that aims to corrupt or steal data or disrupt an organization's systems or the entire organization. A security event refers to an occurrence during which company data or its network may have been exposed.

What is a threat event?

An event or situation that has the potential for causing undesirable consequences or impact.

What are the 3 threats to information security?

Information Security threats can be many like Software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion.