Embezzlement and abuse are attacks that pose the threat of extortion. 8. Computer system assets can be classified as hardware.
Threat Consequences: Security compromise resulting from threat actions. Including disclosure, deception, interference and embezzlement. The following sections describe the four types of threat outcomes and list and explain the types of threat actions that cause each outcome.
A threat is a potential security risk that can exploit system or asset vulnerabilities. An attack, on the other hand, is the actual exploitation of a vulnerability in an information security system. Threats and attacks that can compromise information security can be prevented in a number of ways.
Learn more about consequences at
https://brainly.com/question/956400
#SPJ4