Chapter 4 Threat and Error Management