the next step after you know your resources, now is the time to understand different threats of each resources that you have. Threat itself is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm. Threats can come from both external and internal sources.
A threat can be either “intentional” (i.e., intelligent; e.g., an individual cracker or a criminal organization) or “accidental” (e.g., the possibility of a computer malfunctioning, or the possibility of an “act of God” such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event. as an example is a power outage. this can caused by an intentional or by some other natural creatures like lightning strike.
Here are examples of some threats and its consequences.
After we know and understanding threats that could happen to our resources, then we can adjust the risk and its measurement and also make an action in order to protect minimize the risk of our assets that could happen caused by threats. Many things can do by Security Admin, but as a start, many experts agree that controlling access is the beginning to securing resources or assets, the first step is by securing & controlling physical access, and digital access also.