Information Systems Threat Identification Resource
Information Systems Threat Identification Resource
1. Purpose
This threat identification resource has been developed to assist system owners and developers. This
resource presents a broad view of the risk environment. The threats presented in this document were
selected based on their occurrence and significance.
Categories: The threat resource is categorized into four main groups: environmental/physical
threats, human threats, natural threats, and technical threats. The categories list is not exhaustive. It
was developed as a guide to spur identification of threats and vulnerabilities. As conditions and
technology change, other categories not included here could apply to the system under review.
Threats: Within each section the threats are identified and described. The threat list is not
exhaustive. Other threats not included here could apply to the system under review. For this reason,
an entry for other threats has been included in each section. The effects of threats vary considerably
from confidentiality and integrity of data to the availability of a system. Therefore, System Impact
is identified within the threat column for each described threat.
Examples: To further assist those consulting this resource, examples of each type of threat have
been provided. The examples are not all inclusive. They provide guidance. Other conditions
requiring consideration may be present for the system under consideration. If they exist, these
conditions should be addressed by system owners and developers.
Confidentiality
Human Espionage
Impersonation
Improper Disposal of Sensitive Media
Inadvertent Acts or Carelessness
Omissions
Scavenging
Shoulder Surfing
Theft, Sabotage, Vandalism, or Physical Intrusion
User Abuse or Fraud
Technical
Compromising Emanations
Corruption by System, System Errors, or Failures
Data/System Contamination
Eavesdropping
Insertion of Malicious Code, Software, or Database
Modification
Installation Errors
Intrusion or Unauthorized Access to System Resources
Misrepresentation of Identity / Impersonation
Misuse of Known Software Weaknesses
Takeover of Authorized Session
Environmental None
Natural None
Natural None