Skip to main content

Threat

Also known as: Threat Actor, Threat Community

Anything with the potential to cause loss to an asset by exploiting a vulnerability, characterised by the actor's motivation, capability, and frequency of attempted action.

Written by Askara Solutions editorial team · Updated

A threat is the thing that could go wrong, considered before any judgement about whether it would succeed. In ISO 27000 vocabulary the definition is deliberately broad: a potential cause of an unwanted incident. In FAIR it is sharper: a threat is characterised by a community of actors with motivation, capability, and a frequency at which they attempt the relevant action. Both definitions matter because they answer different questions.

The distinction worth holding is between threat and threat actor. A threat actor is the entity (a criminal group, a privileged insider, a nation-state programme, a third-party engineer making a configuration mistake) whose action could lead to loss. A threat is the action itself, considered in the context of the asset and the loss form: data exfiltration, fraudulent payment, system unavailability, regulatory breach. A useful risk scenario binds the two, because the frequency of the action and the capability behind it both depend on who is doing it.

Threat estimates are notoriously hard to pin down, but they do not need to be precise to be useful. Industry threat-intelligence reports calibrate the orders of magnitude. Internal incident history calibrates the local rate. A three-point estimate (minimum plausible, most likely, maximum plausible) is enough to feed the FAIR factors, and the analysis becomes meaningful once the estimate is owned by people who handle the relevant systems. The Risk Investigation Agent maintains the threat catalogue alongside the risk scenarios it informs, so a change in the threat landscape flows through to the affected scenarios rather than being noted and forgotten.

Related terms

  • Threat Event Frequency

    The expected number of times per year that a threat actor will attempt the action that could lead to a loss event, before any consideration of whether the attempt succeeds.

  • FAIR

    Quantitative risk-analysis methodology that expresses cyber risk as financial loss exposure rather than ordinal severity scores, by decomposing it into loss event frequency and loss magnitude.

  • Vulnerability

    A weakness in an asset, control, or process that a threat could exploit to cause loss. In FAIR, the probability that a threat event becomes a loss event when an attempt is made.

  • Risk Assessment

    The structured process of identifying threats, estimating likelihood and impact, and producing a defensible record of which risks the organisation accepts, treats, or transfers.