Threats to Information System

Threats to Information System

Anything which has the potential to cause harm to the information system is called a Threat. Threats exploit the vulnerability of the information systems by breaching the security and provide a clear idea of how to make a system more secure and efficient. In other words, we can say that a threat is anything that can disrupt the operation, functioning, integrity, or availability of a network or system.

Threats to Information System


Vulnerability is an inherent weakness in the design, configuration, or implementation of a network or system that renders it susceptible to a threat. Most vulnerability can usually be traced back to one of three sources:

1.    Poor Design

Hardware and software systems that contain design flaws that can be exploited. In essence, the systems are created with security holes.

2.    Poor Implementation

Systems that is incorrectly configured, and therefore vulnerable to attack. This type of vulnerability usually results from inexperience, insufficient training, or sloppy work.

3.    Poor Management

Inadequate procedures and insufficient balances. Security measures cannot operate in a vacuum; they need to be documented and monitored. Even something as simple as the daily backup of a system needs to be verified. There also needs to be delineation of responsibility for some functions and dual custody for others.

In this manner, an organization can ensure that procedures are being followed and that no one person has total control of a system.


Identification is simply the process of identifying one’s self to another entity or determining the identity of the individual or entity with whom we are communicating.


This refers to whether the network, system, hardware, and software are reliable and can recover quickly and completely in the event of an interruption in service. Ideally, these elements should not be susceptible to denial of service attacks.


The use or exploitation of vulnerability. This term is neither malicious nor benevolent. A bad guy may attack a system, and a good guy may attack a problem.


The person or process that initiates an attack. This can be synonymous with threat.


The instantiation of vulnerability; something that can be used for an attack. A single vulnerability may lead to multiple exploits, but not every vulnerability may have an exploit.


The person, company, or system that is directly vulnerable and impacted by the exploit. Some exploits have multiple impacts, with both primary targets and secondary targets.

Attack Vector

The path from an attacker to a target. This includes tools and techniques.


The person or process that mitigates or prevents an attack.


The successful exploitation of a target by an attacker.


A qualitative assessment describing the likelihood of an attacker/threat using an exploit to successfully bypass a defender, attacks a vulnerability, and compromise a system.

Threats models are used for optimizing information security and the security of systems. A good threat model exploits the vulnerability of the system and the information and in this way we get a clear idea of what are the weak points of the system that are vulnerable to attacks and we can build a secure and efficient system.

You May Also Like-
What are imperfection or defects of Solids
What Do you know about Solid State?
What do you know about Solid Waste??
Processing of solid waste and On-site Handling by engineering System
What do you know about Hazardous Waste??
Landfill Disposal of Solid Waste

Bricks: Uses, Size, Weight, Frog, Types, and Much More

What are Bricks? Bricks are one of the oldest building materials and it’s extensively used at present as a loading material in construction methods because of its durability, strength, reliability, low cost, easy availability, etc. Bricks are manufactured by molding burnt clay or a mixture of sand and lime or of Portland cement concrete, in…

Continue Reading Bricks: Uses, Size, Weight, Frog, Types, and Much More

Sound Insulation And Sound Insulating Materials

Sound Insulation A well-designed building should incorporate sound insulation to restrain the noise level. High noise conditions result in uncomfortable living conditions, mental strains, fatigue, and may even lead to a nervous breakdown or temporary deafness. Adequate insulation can be achieved by using sound-absorbing or sound repellent materials. Sound Insulating Materials Sound Insulating Materials fall…

Continue Reading Sound Insulation And Sound Insulating Materials

Heat Insulating Materials: Convection, Radiation, and Conduction

Heat Insulating Materials The purpose of thermal insulation is to restrict the heat transfer from warmer to cooler areas. Transfer of heat takes place by three processes- the convection, the radiation and, the conduction. Convection In convection, heat is transferred from one place to another by the movement and mixing of liquids or gases. Radiation…

Continue Reading Heat Insulating Materials: Convection, Radiation, and Conduction

Leave a Reply

Your email address will not be published. Required fields are marked *