Skip to content
geeksforgeeks
  • Tutorials
    • Python
    • Java
    • Data Structures & Algorithms
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps And Linux
    • School Learning
    • Practice Coding Problems
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • Data Science Training Program
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • Aptitude
  • Engineering Mathematics
  • Discrete Mathematics
  • Operating System
  • DBMS
  • Computer Networks
  • Digital Logic and Design
  • C Programming
  • Data Structures
  • Algorithms
  • Theory of Computation
  • Compiler Design
  • Computer Org and Architecture
Open In App
Next Article:
Difference Between Threat, Vulnerability and Risk in Computer Network
Next article icon

Difference Between Threat, Vulnerability and Risk in Computer Network

Last Updated : 22 Apr, 2025
Comments
Improve
Suggest changes
Like Article
Like
Report

Learning about the fundament concepts of Threat, Vulnerability, and Risk enables us to take better precautions against digital frauds and dangers. The number of cybercrimes that have been rising in this digital era shows how the aspects of our lives move online. In this article, we'll learn about Threats, Vulnerability, and Risk as well as look at the differences and how they relate to each other.

What is Threat?

A cyber threat is a malicious act that seeks to steal or damage data or discompose the digital network or system. Threats can also be defined as the possibility of a successful cyber attack to get access to the sensitive data of a system unethically. Examples of threats include computer viruses,  Denial of Service (DoS) attacks, data breaches, and even sometimes dishonest employees. 

Types of Threat

Threats could be of three types, which are as follows:

  1. Intentional- Malware, phishing, and accessing someone's account illegally, etc. are examples of intentional threats.
  2. Unintentional- Unintentional threats are considered human errors, for example, forgetting to update the firewall or the anti-virus could make the system more vulnerable.
  3. Natural- Natural disasters can also damage the data, they are known as natural threats.

What is Vulnerability?

In cybersecurity, a vulnerability is a flaw in a system's design, security procedures, internal controls, etc., that can be exploited by cybercriminals. In some very rare cases, cyber vulnerabilities are created as a result of cyberattacks, not because of network misconfigurations. Even it can be caused if any employee anyhow downloads a virus or a social engineering attack.

Types of Vulnerability

Vulnerabilities could be of many types, based on different criteria, some of them are:

  1. Network- Network vulnerability is caused when there are some flaws in the network's hardware or software.
  2. Operating system- When an operating system designer designs an operating system with a policy that grants every program/user to have full access to the computer, it allows viruses and malware to make changes on behalf of the administrator.
  3. Human- Users' negligence can cause vulnerabilities in the system.
  4. Process- Specific process control can also cause vulnerabilities in the system.

What is Risk? 

Cyber risk is a potential consequence of the loss or damage of assets or data caused by a cyber threat. Risk can never be completely removed, but it can be managed to a level that satisfies an organization's tolerance for risk. So, our target is not to have a risk-free system, but to keep the risk as low as possible. 
Cyber risks can be defined with this simple formula- Risk = Threat + Vulnerability. Cyber risks are generally determined by examining the threat actor and type of vulnerabilities that the system has. 

Types of Risks

There are two types of cyber risks, which are as follows:

1. External- External cyber risks are those which come from outside an organization, such as cyberattacks, phishing, ransomware, DDoS attacks, etc.

2. Internal- Internal cyber risks come from insiders. These insiders could have malicious intent or are just not be properly trained.

Real World Examples of Threat, Vulnerability and Risk in Computer Network

Threats

  1. The WannaCry Ransomware Attack in 2017 used flaws in Microsoft Windows by encrypting data and demand ransom payments from users.
  2. Phishing Attacks, is the attack where the attacker uses email to tricks users into disclosing their personal information that leads to data breaches or financial loss.
  3. A malicious code was inserted into SolarWinds Orion software by the hackers that made it's supply chain security vulnerable.

Vulnerabilities

  1. A bug in the OpenSSL cryptographic package allowed attackers to access sensitive data from different sites using this package.
  2. In 2018, critical vulnerabilities was found in modern processors permitted unauthorized access to data stored in memory.
  3. A multiple zero-day vulnerabilities, together referred as ProxyLogon, allowed attackers to inject malware in Microsoft Exchange Server, which made it possible for the hackers to access email accounts.

Risks

  1. Target’s network, had some flaws which was exploited by external attackers in 2013, allowing the attacker to steal credit card information of millions of customers.
  2. Due to a bug in Equifax’s web application, sensitive private information of 147 million people was exposed.
  3. In 2022, attackers obtained access to Okta's internal system that highlighted the vulnerability in it's identity management system.

Difference Between Threat, Vulnerability, and Risk

Threat

Vulnerability

Risk

Take advantage of vulnerabilities in the system and have the potential to steal and damage data.

Known as the weakness in hardware, software, or designs, which might allow cyber threats to happen.

The potential for loss or destruction of data is caused by cyber threats.

Generally, can't be controlled

Can be controlled

Can be controlled

It may or may not be intentional.

Generally, unintentional

Always intentional

Can be blocked by managing the vulnerabilities

Vulnerability management is a process of identifying the problems, then categorizing them, prioritizing them, and resolving the vulnerabilities in that order

Reducing data transfers, downloading files from reliable sources, updating the software regularly, hiring a professional cybersecurity team to monitor data, developing an incident management plan, etc. help to lower down the possibility of cyber risks

Can be detected by anti-virus software and threat detection logs

Can be detected by penetration testing hardware and many vulnerability scanners

Can be detected by identifying mysterious emails, suspicious pop-ups, observing unusual password activities, a slower than normal network, etc

Conclusion

Despite having different meanings, the terms threat, vulnerability, and risk are often used together. Threats are possibility of something negative to happen, vulnerabilities are flaws that can be used against you, and risks are the possible outcomes of these exploits. Understanding the difference between them helps us in better risk prediction, reduces cyber threats, improve system's security and protect user sensitive private data.


Next Article
Difference Between Threat, Vulnerability and Risk in Computer Network

D

diyaroy22
Improve
Article Tags :
  • Computer Subject
  • Computer Networks
  • Ethical Hacking

Similar Reads

    Difference Between Vulnerability and Exploit
    The concepts of vulnerability and exploit are fundamental in Cyber Security, yet they represent different aspects of security risks. While a vulnerability refers to a weakness or flaw in a system that could potentially be exploited, an exploit is the actual method or tool used by attackers to take a
    5 min read
    Difference between Network Security and Cyber Security
    In today’s global village the terms ‘Network Security’ and ‘Cyber Security’ are actually two sides of the same coin but they are different in some ways. It is important to note that although necessary for the security of information, both concepts are unique and perform different functions in the sp
    5 min read
    Difference Between Computer Networks and Distributed Systems
    A computer network is a group of interconnected computers that share resources and data. Distributed systems, while similar, consist of autonomous computers working together to perform tasks. These systems form the backbone of modern digital communication and processing. Yet, they serve different pu
    5 min read
    List of "Difference Between" Computer Networks Topics
    Computer Network is a set of devices or systems that shares resources through links and it can be defined as a collection of nodes. A node can be any device capable of transferring or receiving data. The communicating nodes need to be connected by communication links. A computer network refers to in
    4 min read
    Difference between Internet and Intranet
    In the field of network and information technology, there are the terms “Internet” and “Intranet” which are used interchangeably but have different meanings. Thus, it is often important to take note of the distinctions that pertain to the two so as to avoid misunderstandings concerning the managemen
    4 min read
geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • In Media
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Placement Training Program
  • Languages
  • Python
  • Java
  • C++
  • PHP
  • GoLang
  • SQL
  • R Language
  • Android Tutorial
  • Tutorials Archive
  • DSA
  • Data Structures
  • Algorithms
  • DSA for Beginners
  • Basic DSA Problems
  • DSA Roadmap
  • Top 100 DSA Interview Problems
  • DSA Roadmap by Sandeep Jain
  • All Cheat Sheets
  • Data Science & ML
  • Data Science With Python
  • Data Science For Beginner
  • Machine Learning
  • ML Maths
  • Data Visualisation
  • Pandas
  • NumPy
  • NLP
  • Deep Learning
  • Web Technologies
  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • ReactJS
  • NextJS
  • Bootstrap
  • Web Design
  • Python Tutorial
  • Python Programming Examples
  • Python Projects
  • Python Tkinter
  • Python Web Scraping
  • OpenCV Tutorial
  • Python Interview Question
  • Django
  • Computer Science
  • Operating Systems
  • Computer Network
  • Database Management System
  • Software Engineering
  • Digital Logic Design
  • Engineering Maths
  • Software Development
  • Software Testing
  • DevOps
  • Git
  • Linux
  • AWS
  • Docker
  • Kubernetes
  • Azure
  • GCP
  • DevOps Roadmap
  • System Design
  • High Level Design
  • Low Level Design
  • UML Diagrams
  • Interview Guide
  • Design Patterns
  • OOAD
  • System Design Bootcamp
  • Interview Questions
  • Inteview Preparation
  • Competitive Programming
  • Top DS or Algo for CP
  • Company-Wise Recruitment Process
  • Company-Wise Preparation
  • Aptitude Preparation
  • Puzzles
  • School Subjects
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Social Science
  • English Grammar
  • Commerce
  • World GK
  • GeeksforGeeks Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
geeksforgeeks-suggest-icon
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
geeksforgeeks-improvement-icon
Suggest Changes
min 4 words, max Words Limit:1000

Thank You!

Your suggestions are valuable to us.

What kind of Experience do you want to share?

Interview Experiences
Admission Experiences
Career Journeys
Work Experiences
Campus Experiences
Competitive Exam Experiences