computersecurityhandbook.com
Home  >  Fourth Edition  >  Chapter 14
Chapter 14 –  Physical Threats to the Information Infrastructure
     Franklin N. Platt

Chapter Contents:

   14.1    Introduction
   14.2    Background and Perspective
   14.2.1    Today's Risks Are Greater
   14.2.2    Likely Targets
   14.2.3    Productivity Issues
   14.2.4    Terrorism and Violence Are Now Serious Threats
   14.2.5    Costs of a Threat Happening
   14.2.6    Who Must Be Involved?
   14.2.7    A Standard Process
   14.2.8    Liability Issues
   14.2.9    Definitions and Terms
   14.3    Threat Assessment Process
   14.3.1    Set Up a Steering Committee
   14.3.2    Sources of Information and Assistance
   14.3.3    Identify All Possible Threats
   14.3.4    Determine the Likelihood of Each Threat
   14.3.5    Approximate the Direct Costs
   14.3.6    Consider Cascading Costs
   14.3.7    Prioritize the Threats
   14.3.8    Completing the Threat Assessment Report
   14.4    General Threats
   14.4.1    Natural Events
   14.4.1.1    Blight
   14.4.1.2    Building or Bridge Collapse
   14.4.1.3    Dam Failure
   14.4.1.4    Drought
   14.4.1.5    Earthquake and Volcanic Eruption
   14.4.1.6    Epidemic
   14.4.1.7    Landslide
   14.4.1.8    Flood
   14.4.1.9    Hurricane or Tornado
   14.4.2    Technical Events
   14.4.2.1    Utility Disruptions
   14.4.2.2    Physical Attacks
   14.4.2.3    Coordinated Attacks
   14.4.2.4    Hazardous Material (HAZMAT) Incidents
   14.4.2.5    Radiological Incidents
   14.4.2.6    Biological Hazards
   14.4.3    Fire and Smoke
   14.4.4    Water Leaks and Flooding
   14.4.5    Environmental Problems
   14.4.5.1    Dust
   14.4.5.2    Humidity
   14.4.5.3    Temperature
   14.4.5.4    High-Intensity Radio-Frequency Flux
   14.4.6    Utility Problems
   14.5    Man-Made Threats
   14.5.1    Accidents
   14.5.2    Civil or Political Disorder
   14.6.3    Wiring Runs and Exposed Wire
   14.5.4    Intrusion
   14.5.5    Wiretaps
   14.5.6    High-Energy Radio-Frequency Weapons
   14.5.7    Workplace Violence and Terrorism
   14.6    Other Threats
   14.6.1    Off-Hour Visitors
   14.6.2    Storage Rooms
   14.6.3    Medical Emergencies
   14.6.4    Using an Illicit Terminal
   14.7    Confidential Information About Threats
   14.8    Summary
   14.9    Notes
   14.10    For Further Reading

Please report problems to the webmaster at: webmaster@removethis.rlgsc.com
copyright 2002-2006, Robert Gezelter, All Rights Reserved