ISO 27005 Lista-Am+Vu PDF
ISO 27005 Lista-Am+Vu PDF
ISO 27005 Lista-Am+Vu PDF
Fire A, D, E
Physical damage
Water damage A, D, E
Pollution A, D, E
Major accident A, D, E
Climatic phenomenon E
Natural events
Seismic phenomenon E
Volcanic phenomenon E
Meteorological phenomenon E
Flood E
Electromagnetic radiation A, D, E
Disturbance due to
radiation Thermal radiation A, D, E
Electromagnetic pulses A, D, E
Eavesdropping D
Theft of equipment D
Disclosure A, D
Position detection D
Equipment failure A
Technical failures
Equipment malfunction A
Software malfunction A
Corruption of data D
Error in use A
Compromise of
functions Abuse of rights A, D
Forging of rights D
Denial of actions D
Challeng • Hacking
Hacker, cracker e Ego • Social engineering
Rebellion
• System intrusion, break-ins
Status
Money • Unauthorized system access
Blackmail • Bomb/Terrorism
Terrorist
Destruction • Information warfare
Exploitation
• System attack (e.g. distributed denial of service)
Revenge
Political Gain • System penetration
Media Coverage • System tampering
The following table gives examples for vulnerabilities in various security areas, including examples of threats that might exploit these
vulnerabilities. The lists can provide help during the assessment of threats and vulnerabilities, to determine relevant incident scenarios. It is
emphasized that in some cases other threats may exploit these vulnerabilities as well.