DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
The Latest "Software Integration: The Intersection of APIs, Microservices, and Cloud-Based Systems" Trend Report
Get the report
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Cyber Threats vs Vulnerabilities vs Risks

Cyber Threats vs Vulnerabilities vs Risks

While at first blush these may all look like synonyms, they in fact refer to different aspects of cybersecurity, and knowing the difference is crucial.

Ian Muscat user avatar by
Ian Muscat
·
Nov. 09, 17 · Tutorial
Like (2)
Save
Tweet
Share
7.05K Views

Join the DZone community and get the full member experience.

Join For Free

It's common for terms such as cyber threats, vulnerabilities, and risks to be conflated and confused. This post aims to define each term, highlight how they differ, and how they are related to one another.

Cyber Threats

Cyber threats, or simply threats, refer to circumstances or events with the potential to cause harm by way of their outcome. A few examples of common threats include an attacker stealing sensitive data from your applications, political activists DDoSing your website, an administrator accidentally wiping a production system, and a storm flooding your ISP's data center.

Cyber threats are actualized by threat actors. Threat actors usually refer to persons or entities who may potentially initiate a threat. While natural disasters and other environmental and political events do constitute threats, they are not generally regarded as being threat actors (this does not mean that such threats should be disregarded or given less importance).

Examples of common threat actors include financially motivated criminals (cybercriminals), politically motivated activists (hacktivists), competitors, careless employees, disgruntled employees, and nation-state attackers.

Cyber threats can also become more dangerous because of threat actors leveraging one or more vulnerabilities in a system, which is what we'll touch upon next.

Vulnerabilities

Vulnerabilities simply refer to weaknesses in a system. Vulnerabilities make threats possible and potentially even more dangerous. A system could be exploited through a single vulnerability, for example, a single SQL injection vulnerability could provide an attacker with full control over sensitive data, or, an attacker could chain several exploits together, exploiting more than one vulnerability in order to exploit a system.

Examples of common vulnerabilities are Cross-site Scripting, SQL injection, server misconfigurations, sensitive data transmitted in plain text, and using software packages with known vulnerabilities.

Risks

Risks are usually confused with threats, however, there is a nuanced difference between the two - a risk refers to the combination of a threat's probability and a threat's loss/impact (usually in monetary terms, however, it should be noted that quantifying a breach is extremely difficult). Essentially, this translates to the following:

risk = threat probability x potential loss

Therefore a risk is a scenario that should be avoided, combined with the likely losses to result from that scenario. The following is a hypothetical example of how a risk can be constructed.

  • SQL injection is a vulnerability.
  • Sensitive data theft is (one of) the cyber threats SQL injection enables.
  • Financially motivated attackers are (one of) the threat actors.
  • The impact of sensitive data getting stolen will bear a significant financial cost (financial and reputational loss) to the business.
  • The probability of such an attack occurring is high, given that SQL injection is an easily and widely exploited vulnerability and this site is externally facing.

Therefore, the SQL injection vulnerability in the scenario above should be treated as a high-risk vulnerability.

While the difference between a vulnerability and a cyber threat and risks is usually understood, the difference between threats and risks may be more nuanced. Understanding this difference in terminology allows for clearer communication and a better understanding of how threats influence risks. Of course, accurately quantifying a threat's potential loss is the real hard part.

Vulnerability

Published at DZone with permission of Ian Muscat, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Building Microservice in Golang
  • Monolithic First
  • The 5 Books You Absolutely Must Read as an Engineering Manager
  • Tracking Software Architecture Decisions

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: