Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

1.4.1. Assets, Threats, Vulnerabilities, and Risk

💡 First Principle: Risk only exists at the intersection of three factors: something worth protecting (asset), something that can harm it (threat), and a weakness that enables the harm (vulnerability). Remove any one factor and the risk disappears.

Asset: Anything of value to the organization that needs protection. Assets can be tangible (hardware, facilities) or intangible (data, intellectual property, reputation). Assets have value — the more valuable the asset, the higher the potential impact if harmed.

Threat: A potential cause of harm to an asset. Threats can be natural (earthquake, flood), human-accidental (user error, misconfiguration), or human-intentional (attacker, insider threat). Threat actors have motivation, capability, and opportunity — all three must exist for a threat to be realized.

Vulnerability: A weakness in a system, process, or control that a threat can exploit. Vulnerabilities have likelihood of exploitation — determined by how exposed the vulnerability is, how well-known it is, and whether exploit tools exist.

Risk: The intersection of threat, vulnerability, and asset value. The formal relationship:

Risk = Threat × Vulnerability × Asset Value
OR (simplified)
Risk = Likelihood of Harm × Impact of Harm
TermDefinitionExample
AssetSomething of value requiring protectionCustomer database containing 2M PII records
ThreatAgent or event that can cause harmRansomware-as-a-Service criminal syndicate
VulnerabilityWeakness enabling the threatUnpatched SMB service, weak backup controls
LikelihoodProbability of threat exploiting vulnerabilityHigh (active ransomware campaigns targeting healthcare)
ImpactHarm if threat is realized$4M ransom + $12M operational downtime + $8M regulatory fines
RiskCombined exposureVery High — immediate treatment required
Residual RiskRemaining risk after controls appliedMedium — after EDR, backup hardening, and network segmentation

⚠️ Exam Trap: "Exposure" is the degree to which an asset is subject to a threat. High exposure (internet-facing server) doesn't automatically mean high risk — if the asset is low-value and the threat has low capability, risk may be manageable. Always think in terms of the intersection.

Reflection Question: A company runs an outdated version of a web framework with a known SQL injection vulnerability on a development server not accessible from the internet and containing no real data. What is the risk level, and what factors justify your assessment?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications