{"id":34527,"date":"2023-06-12T09:18:25","date_gmt":"2023-06-12T08:18:25","guid":{"rendered":"https:\/\/www.gt-engineering.it\/?post_type=normativa_tecnica&#038;p=34527"},"modified":"2023-08-11T08:58:22","modified_gmt":"2023-08-11T07:58:22","slug":"evaluation-of-threats","status":"publish","type":"normativa_tecnica","link":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/","title":{"rendered":"Evaluation of threats"},"content":{"rendered":"\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n        \n                    <div\n                class=\"h-auto mb-6 md:mb-4 lg:mb-8 xl:mb-9 float-left mr-6 md:mr-4 lg:mr-8 xl:mr-9  overflow-hidden shadow-content-image w-full md:w-1\/3\"\n            >\n                \r\n\r\n    \r\n        \r\n            \r\n                \r\n                    <picture\r\n                        class=\"\"\r\n                                            >\r\n                                                                                                        <source\r\n                                media=\"(max-width: 150px)\"\r\n                                width=\"150\"\r\n                                height=\"150\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-150x150.jpg\"\r\n                                type=\"image\/jpeg\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 300px)\"\r\n                                width=\"300\"\r\n                                height=\"200\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-300x200.jpg\"\r\n                                type=\"image\/jpeg\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 768px)\"\r\n                                width=\"768\"\r\n                                height=\"512\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-768x512.jpg\"\r\n                                type=\"image\/jpeg\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 1024px)\"\r\n                                width=\"1024\"\r\n                                height=\"683\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-1024x683.jpg\"\r\n                                type=\"image\/jpeg\"\r\n                            \/>\r\n                                                                            <img\r\n                            class=\"a-image transparent border-image h-auto  w-full\"\r\n                                                        srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-scaled.jpg\"\r\n                                                        title=\"shutterstock_54729580\"\r\n                                                        type=\"image\/jpeg\"\r\n                        \/>\r\n                    <\/picture>\r\n\r\n                \r\n\r\n                    \r\n    \r\n            <\/div>\n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p>Threats can be described as the possible actions that can be taken for example against a<\/p>\n<p>system. Types of threats can be accidental or non-validated changes. Unfortunately, we have to realise that no protection against attacks, failures, mistakes, or natural disasters can ever be<\/p>\n<p>completely absolute.<\/p>\n<p>&nbsp;<\/p>\n<p>Threat agents can be defined as one of the following:<\/p>\n<ol>\n<li><strong>A malicious person<\/strong> who is deliberately attacking systems for financial reward, power, revenge, or other gain:<\/li>\n<\/ol>\n<ul>\n<li>Insider \u2013 An insider is a &#8220;trusted&#8221; person, employee, contractor, or supplier who has information that is not generally known to the public. An insider can present a threat even if there is no intent to do harm. For example, the threat can arise as a result of an insider bypassing security controls &#8220;to get the job done.&#8221;<\/li>\n<li>Outsider \u2013 An outsider is a person or group not &#8220;trusted&#8221; with inside access, which can be known, or not, to the targeted organization. Outsiders can have been insiders, or not, at one time.<\/li>\n<\/ul>\n<ol>\n<li><strong>Inadvertent mistake<\/strong> (error) caused by a person who either failed to pay attention or did not recognize the consequences of their action. Computer applications can also have &#8220;bugs&#8221; or other flaws that cause them to mis-operate. Poorly designed systems and inadequate operating procedures also fall in this category.<\/li>\n<li><strong>Equipment failure (failure)<\/strong> that was not any person\u2019s fault, but reflects the fact that electronic and mechanical devices fail in preventing the threat from having success.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n","protected":false},"excerpt":{"rendered":"<p>Threats can be described as the possible actions that can be taken for example against a<\/p>\n","protected":false},"author":2,"featured_media":42001,"parent":34508,"menu_order":2,"template":"","meta":{"_acf_changed":false,"footnotes":""},"normative-tecniche":[58],"class_list":["post-34527","normativa_tecnica","type-normativa_tecnica","status-publish","has-post-thumbnail","hentry","tipologia_normativa-en-iec-standards"],"acf":{"sottotitolo":"","allegati":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Evaluation of threats - Gt-Engineering<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evaluation of threats - Gt-Engineering\" \/>\n<meta property=\"og:description\" content=\"Threats can be described as the possible actions that can be taken for example against a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Gt-Engineering\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-11T07:58:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/\",\"url\":\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/\",\"name\":\"Evaluation of threats - Gt-Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.gt-engineering.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-scaled.jpg\",\"datePublished\":\"2023-06-12T08:18:25+00:00\",\"dateModified\":\"2023-08-11T07:58:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/#primaryimage\",\"url\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-scaled.jpg\",\"contentUrl\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gt-engineering.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technical standards\",\"item\":\"https:\/\/www.gt-engineering.it\/en\/normative-tecniche\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"EN IEC Standards\",\"item\":\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"IEC TS 63074: 2023 &#8211; Security aspects related to functional safety\",\"item\":\"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Evaluation of threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gt-engineering.it\/en\/#website\",\"url\":\"https:\/\/www.gt-engineering.it\/en\/\",\"name\":\"Gt-Engineering\",\"description\":\"bizonweb\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gt-engineering.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evaluation of threats - Gt-Engineering","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/","og_locale":"en_US","og_type":"article","og_title":"Evaluation of threats - Gt-Engineering","og_description":"Threats can be described as the possible actions that can be taken for example against a","og_url":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/","og_site_name":"Gt-Engineering","article_modified_time":"2023-08-11T07:58:22+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/","url":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/","name":"Evaluation of threats - Gt-Engineering","isPartOf":{"@id":"https:\/\/www.gt-engineering.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-scaled.jpg","datePublished":"2023-06-12T08:18:25+00:00","dateModified":"2023-08-11T07:58:22+00:00","breadcrumb":{"@id":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/#primaryimage","url":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-scaled.jpg","contentUrl":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/shutterstock_54729580-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/evaluation-of-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gt-engineering.it\/en\/"},{"@type":"ListItem","position":2,"name":"Technical standards","item":"https:\/\/www.gt-engineering.it\/en\/normative-tecniche\/"},{"@type":"ListItem","position":3,"name":"EN IEC Standards","item":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/"},{"@type":"ListItem","position":4,"name":"IEC TS 63074: 2023 &#8211; Security aspects related to functional safety","item":"https:\/\/www.gt-engineering.it\/en\/technical-standards\/en-iec-standards\/iec-ts-63074-2023\/"},{"@type":"ListItem","position":5,"name":"Evaluation of threats"}]},{"@type":"WebSite","@id":"https:\/\/www.gt-engineering.it\/en\/#website","url":"https:\/\/www.gt-engineering.it\/en\/","name":"Gt-Engineering","description":"bizonweb","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gt-engineering.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.gt-engineering.it\/en\/wp-json\/wp\/v2\/normativa_tecnica\/34527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gt-engineering.it\/en\/wp-json\/wp\/v2\/normativa_tecnica"}],"about":[{"href":"https:\/\/www.gt-engineering.it\/en\/wp-json\/wp\/v2\/types\/normativa_tecnica"}],"author":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/en\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":4,"href":"https:\/\/www.gt-engineering.it\/en\/wp-json\/wp\/v2\/normativa_tecnica\/34527\/revisions"}],"predecessor-version":[{"id":42007,"href":"https:\/\/www.gt-engineering.it\/en\/wp-json\/wp\/v2\/normativa_tecnica\/34527\/revisions\/42007"}],"up":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/en\/wp-json\/wp\/v2\/normativa_tecnica\/34508"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/en\/wp-json\/wp\/v2\/media\/42001"}],"wp:attachment":[{"href":"https:\/\/www.gt-engineering.it\/en\/wp-json\/wp\/v2\/media?parent=34527"}],"wp:term":[{"taxonomy":"tipologia_normativa","embeddable":true,"href":"https:\/\/www.gt-engineering.it\/en\/wp-json\/wp\/v2\/normative-tecniche?post=34527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}