Note 1 to entry: The source of harm can be malicious or accidental.
Note 2 to entry: Computer security covers mainly availability, integrity and confidentiality.