ABSTRACT

In the early 1990s, the word "hacker" was used to describe a great programmer, someone who was able to build complex logics. Unfortunately, over time the word gained negative hype, and the media started referring to a hacker as someone who discovers new ways of hacking into a system, be it a computer system or a programmable logic controller. Therefore, the term has been broken down into three types of hacker: white hat, black hat, and gray hat. A threat may be a malicious hacker who is trying to gain unauthorized access to an asset. Threat represents something that an organization doesn't want to happen. It represents something that an organization doesn't want to happen. A successful exploitation of vulnerability is a threat. Risk Assessment is very crucial for the customer because they would want to know the intensity of the damage the vulnerabilities are likely to cause.