IT security risks are business risks
Threats range from high-tech exploits to gain access to a company’s networks to non-tech tactics such as stealing laptops or items of value. Common examples:
Malware (malicious software): viruses, worms, trojan horses, spyware, and disruptive or destructive programs
Insider error or action, either intentional or unintentional.
Fraud
Fire, flood, or other natural disasters
(Also see Table 5.1 on page 123 of the text.)