Select Page

Threats and Risk Management Concepts

CISSP

  1. Types of Threats:
    • Natural Environment Threats: Earthquakes, floods, tornadoes, and other natural disasters.
    • Supply System Threats: Disruptions in power, communications, water, and gas supplies.
    • Manmade Threats: Vandalism, fraud, theft, and other malicious human activities.
    • Politically Motivated Threats: Terroristic attacks, riots, bombings, and other politically driven actions.
  2. Life Safety:
    • Priority: In any threat scenario, ensuring the safety of human life is the highest priority.
  3. Layered Defense Model:
    • Concept: All physical security controls should work together in a tiered architecture, where multiple layers of defense are employed to protect assets and people.
  4. Vulnerability and Threats:
    • Vulnerability: A weakness or gap in a system that can be exploited by a threat agent.
    • Threat: The potential for someone to identify and exploit a vulnerability, becoming a threat agent.
  5. Risk Analysis Process:
    • Steps: Involves assessing risks, determining an acceptable risk level, establishing a baseline for security, and implementing appropriate countermeasures.
  6. Major Sources of Threats:
    • Temperature: Extreme heat or cold that can affect equipment and personnel.
    • Gases: Harmful gases that can cause damage or pose health risks.
    • Liquids: Water or other liquids that can lead to flooding or equipment damage.
    • Organisms: Viruses and bacteria that can impact health or systems.
    • Projectiles: Cars, trucks, bullets, and other objects that can cause physical damage.
    • Movement: Structural collapse, earthquakes, and other forms of movement that can lead to damage or injury.
    • Energy: Radioactivity, radiation, and other forms of energy that can be hazardous.

Understanding these concepts is crucial for developing comprehensive security strategies that address a wide range of potential threats and vulnerabilities.

Latest Post:

Pin It on Pinterest