User:L07-IST816/Physical Security Threat Sources

Physical Security Threat Source

Physical security countermeasures use barriers, entry and search controls, intrusion detection systems, and various types of alarm assessment. When properly combined with organizational practices and procedures, they are intended to deter, delay, detect, assess, and appropriately respond to an unauthorized activity. When possible, it is always best to deter threats. However, should deterrence fail, we want to delay them long enough to detect their actions, launch the appropriate response, and respond before they can damage our information systems and the data on them. Threats can come from many angles, and many threats may come from opportunity. If potential attackers or employees find a weakness to exploit, they may take advantage of that opportunity even if they had not previously been planning to do something wrong. Physical security requires all-around caution and continuous attention to suspicious behavior or abnormal activity.

Natural/environmental
Natural disasters are fairly easy to understand, but often very hard to predict and to counter. Natural or environmental threats might include earthquakes, floods, storms, hurricanes, fires, etc.

Utilities
Threats may include communication outages, power outages, etc. Backup sources for power, water, and communications can minimize these potential risks. Circumstantial – Many times the threats to an organization may not be the result of anything it has done wrong. Perhaps the threat is due to a fire or break-in at a neighboring building, a strike at a critical point in the supply chain, a radical change in markets, or an adverse reaction to an environmental issue. In these cases, the organization must have contingency plans, be prepared to execute appropriate physical security measures, and protect the assets of the organization effectively. Human-made/political events – Explosions, vandalism, theft, terrorist attacks, strikes, activism, riots, etc. These are also difficult to deal with. They require thorough preventative planning and having a good incident response plan already in place.

Activists
The physical threat comes from unruly citizens in the area, activists protesting against a sensitive issue, or action taken against other firms or governments located in close geographic proximity. Unfortunately, unrest can lead to mobs and vandalism, so in many cases the controls must include barriers, monitoring, and obvious security protection.

Staff
Most staff members are trustworthy and will follow policy and guidelines, but when an opportunity presents itself — such as unguarded equipment or lack of surveillance — or an employee is angry or upset, a staff member may exploit the situation and steal or do damage to the assets of the organization. These attackers are frequently referred to as Advanced Persistent Threats (APTs). Competing companies may pay people to go through the garbage of a company looking for sensitive data or they may implant listening devices into the facility.

Petty criminals
Theft of equipment, vandalism, and damage to property are usually the acts of petty, small-time criminals. Lacking in skill and often with little planning, most of these criminals take advantage of opportunities that present themselves.