Threat Actors/Sources Common Assumptions : Many industrial cyber security programs assume that the greatest threats come from external sources, often hostile and malicious. This assumption leads to deploying security controls primarily focused on defending against external attacks. Reality Check : Documented incident reports reveal that the majority of incidents and the greatest risk to protected architectures stem from insiders or trusted partners. Despite being overlooked, insiders pose significant threats due to their knowledge, access, and potential malicious intent. List of Common Threat Actors/Sources : Adversarial: Outside individual, Inside individual, Trusted insider, Ad hoc group, Established group, Competitor, Supplier, Partner, Customer, Nation state. Accidental: User, Privileged user, Administrator. Structural: Information technology equipment, Software. Environmental: Natural disaster (e.g., fire, flood, tsunami), Man-made disaster (e.g., bombing, overrun), Unusual natural event (e.g., solar EMP), Infrastructure failure (e.g., telecommunications, electrical power).