Sources of Threats

A person, a group of people, or even some phenomena unrelated to human activity can serve as an information security threat. Following from this, all threat sources break down into three groups:

All three threat sources must be accounted for when developing a data security protection system. This User Guide only covers external threats involving human activity.

Also see:

How threats spread

Types of threats

Signs of infection

What to do if you show signs of infection

Preventing infection