- • Human - trusted user abuse, lack of vigilance, uneducated users (joe, PHB syndrome)
- • Network - virtual/physical compromise
- • Server - virtual/physical access
- • Software - permissions escalation, software interactions, side effects
- • Storage - disk, hardcopy
- • Consumption - data consumer disclosure, transfer to insecure area, poor data management...