This section provides orientation on managing threats sources through the Knowledge module. To better manage threats, it’s helpful to identify threats with their sources. For example, a hacker may be considered a possible source, capable of some act of fraud or unauthorized access (threats). This section discusses how to create, edit, and delete threat sources, as well as how to associate threat sources with threats.
Threats can be associated with one or more threat sources. Similarly, a single source can be associated with various threats. For example, the threat source "terrorists" can be associated with the threats "damage to installations", "fraud or sabotage”, and “fire”, among others.