CHAPTER 22
PHYSICAL THREATS TO THE INFORMATION INFRASTRUCTURE
Franklin Platt
22.2 BACKGROUND AND PERSPECTIVE
22.2.1 Today's Risks Are Greater
22.2.4 Terrorism and Violence Are Now Serious Threats
22.2.5 Costs of a Threat Happening
22.2.9 Uniform, Comprehensive Planning Process
22.3 THREAT ASSESSMENT PROCESS
22.3.1 Set Up a Steering Committee
22.3.2 Identify All Possible Threats
22.3.3 Sources of Information and Assistance
22.3.4 Determine the Likelihood of Each Threat
22.3.5 Approximate the Impact Costs
22.3.6 Costs of Cascading Events
22.3.7 Determine the Vulnerability to Each Threat
22.3.8 Completing the Threat Assessment Report
22.4.6 High-Energy Radio-Frequency Threats
22.5 WORKPLACE VIOLENCE AND TERRORISM
22.6.1 Leaks, Temperature, and Humidity
22.6.3 Cleaning and Maintenance Threats
22.7 CONFIDENTIAL THREAT INFORMATION
22.1 INTRODUCTION.
This chapter describes the wide array of possible physical threats that can impact information systems (IS) infrastructure. The infrastructure affected can ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.