Any threat must be viewed as a potential breach of security which, if successful, will have a certain impact. Table 19.1 presents examples of various types of threat, listed under the area on which they may have an impact. For example, ‘viewing and disclosing unauthorized data’ as a threat may result in theft and fraud, loss of confidentiality, and loss