Desktop example (7 potential threats in all):THREAT A-1: Unauthorized access to someone's desktop resulting in disclosure of sensitive data that has been stored on the desktop.
Server example (15 potential threats in all):
THREAT B-7: Someone who has access to the system as part of their job responsibilities uses that access to destroy data or programs.
Network example (8 potential threats in all):
THREAT C-3: Someone uses a packet sniffing tool to capture accounts and passwords to gain access to host systems containing sensitive medical data.
Copyright © 1998 HLN Consulting LLC (http://www.hln.com/)