The University of SydneyPage 28Vulnerabilities and Threats–Disclosure–Mostly about data–Make data available without due consent–Data is stolen (but owner may still have it)–Impact on security and privacy–Intentional or unintended–Interception–Unauthorisedaccess to resources–Copying of programs, data, or other confidential information–An interceptor may use computing resources at one location to access assets elsewhere