1 |
ThreatCondition or activity that has the potential to cause information or information processing resources to be intentionally or accidentally lost, modified, exposed, made inaccessible, or otherwise affec [..]
|
2 |
ThreatAnything (e.g., object, substance, human) that is capable of acting against an asset in a manner that can result in harm. Scope Notes: A potential cause of an unwanted incident (ISO/IEC 13335)
|
3 |
ThreatA potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
|
4 |
ThreatOld English þreat "crowd, troop," also "oppression, coercion, menace," related to þreotan "to trouble, weary," from Proto-Germanic *thrautam (source also of Dutch verdrie [..]
|
5 |
ThreatA combination of the risk, the consequence of that risk, and the likelihood that the negative event will take place.
|
6 |
Threatdanger.
|
7 |
Threatmenace: something that is a source of danger; "earthquakes are a constant threat in Japan" a warning that something unpleasant is imminent; "they were under thre [..]
|
8 |
Threat1. Capabilities, intentions, and attack methods of adversaries to exploit, or any circumstance or event with the potential to cause harm to, information or an information system. [NIS] 2. Any circumstance or event with the potential to harm an information system (IS) through unauthorized access, destruction, disclosure, modification of data, and/or [..]
|
9 |
Threatnoun. 1. a condition which is typed as a threat to one's self or well-being, or to a group. 2. a symptom of unfavorable consequences for failure to adhere to a delivered request or demand, utiliz [..]
|
10 |
Threatstrashunik
|
11 |
ThreatAny indication, circumstance, or event with the potential to cause the loss of, or damage to, an asset. Threat can also be defined as the intention and capability of an adversary to undertake actions [..]
|
12 |
Threatan expression of an intention to injure another : menace [criminal laws against making terroristic s]
|
13 |
ThreatThreat means a communicated intent to inflict harm or loss on another or on another's property. It can be one that might diminish a person's freedom to act voluntarily or with lawful consent [..]
|
14 |
ThreatMaking a statement of taking an action that implies or suggests harm to someone else.
|
15 |
Threat(n) something that is a source of danger(n) a warning that something unpleasant is imminent(n) declaration of an intention or a determination to inflict harm on another(n) a person who inspires fear o [..]
|
16 |
ThreatA natural or manmade occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property. (NIPP, DHS Risk Lexicon)
|
17 |
ThreatSomething that could cause harm to a system or organization.
|
18 |
Threatgoogle_ad_client="pub-8027288574377500";google_ad_slot="1043341745";google_ad_width=120;google_ad_height=600; Definition:A threat against an information infrastructure can be any v [..]
|
19 |
ThreatA source of harm that is deliberate or has the potential or intent to do harm.
|
20 |
ThreatA threat is any unexpected event that can damage company assets and therefore prejudice personal data protection.There are environmental threats (fire), technical threats (system failures) or human th [..]
|
21 |
ThreatA threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the poten [..]
|
22 |
ThreatAny circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
|
23 |
Threat(GCI/AWACS) Informative that an untargeted bandit/bogey is within 10 NM of a friendly.
|
24 |
ThreatAny circumstance or event with the potential to adversely impact an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.
|
25 |
Threat(GCI/AWACS) Informative that an untargeted bandit/bogey is within 10 NM of a friendly.
|
26 |
ThreatRelated to Aggro. This is what a character "gives off" to generate or draw monster aggro.
|
27 |
Threatmenace
|
28 |
ThreatA move or plan that can result in a serious disadvantage, for your opponent, if they don't act to neutralize the Threat. For example, such actions that might neutralize the Threat could be to relocate a piece that's in danger of capture; or to advance a pawn in order to protect/guard a critical square.
|
29 |
ThreatA move or plan, that, if allowed, leads to immediate reduction of the enemy's position.
|
30 |
ThreatThe threat parameter 'Threat' is issued in tropical update bulletins when effects from a tropical system are possible within 72 hours.
|
31 |
ThreatAny circumstance or event with the potential to adversely impact agency operations (including mission functions, image, or reputation) agency assets, or individuals through an information system via u [..]
|
32 |
Threat===Noun===
====an expression of intent to injure or punish another====
=====Synonyms=====
intimidation
warning
menace
threat
protection
blackmail|extortion of money from a person by threats of pub [..]
|
33 |
Threat
v=onepage&q&f=false}}
* year=2005|title=How the Indians Lost Their Land|author=Stuart Banner|passage=Transactions entered into because of a thinly veiled threat of expropriation — sell your land or e [..]
|
<< TELNET | TLS >> |