A threat consists of an adverse action performed by a threat agent on an asset. Examples of threats are:
- A hacker (with substantial expertise, standard equipment, and being paid to do so) remotely copying confidential les from a company network or from card;
- A computer malware seriously degrading the performance of a wide area network;
- A system administrator violating user privacy;
- someone on the internet listening confidential electronic communication.