Human threats: accidental (spilled coffee, fat-finger data entry) or intentional (hackers, insiders, saboteurs).
Malicious vs. non-malicious.
Random (non-targeted) vs. directed (targeted).
Harm types specific to human threats (Parkerian variations):
Interception (unauthorised access)
Interruption (availability loss)
Modification (unauthorised change)
Fabrication (insertion of false data)
Cognitive bias note: People over-estimate rare catastrophic risks and under-estimate common mundane ones (e.g.
fear of air crashes vs.
complacency about automobile accidents).
Method–Opportunity–Motive (M-O-M) Triangle
A threat actor typically needs all three:
Method – Skills/tools/techniques.
Opportunity – Time & access.
Motive – Reason/incentive (financial gain, ideology, thrill, revenge).
Controls often work by removing at least one side of the triangle.