How Can We Help?
The remaining potential risk after all IT security measures are applied. There is a residual risk associated with each threat.
SOURCE: SP 800-33
Portion of risk remaining after security measures have been applied.
SOURCE: CNSSI-4009; SP 800-30