- Types of Threats:
- Natural Environment Threats: Earthquakes, floods, tornadoes, and other natural disasters.
- Supply System Threats: Disruptions in power, communications, water, and gas supplies.
- Manmade Threats: Vandalism, fraud, theft, and other malicious human activities.
- Politically Motivated Threats: Terroristic attacks, riots, bombings, and other politically driven actions.
- Life Safety:
- Priority: In any threat scenario, ensuring the safety of human life is the highest priority.
- Layered Defense Model:
- Concept: All physical security controls should work together in a tiered architecture, where multiple layers of defense are employed to protect assets and people.
- Vulnerability and Threats:
- Vulnerability: A weakness or gap in a system that can be exploited by a threat agent.
- Threat: The potential for someone to identify and exploit a vulnerability, becoming a threat agent.
- Risk Analysis Process:
- Steps: Involves assessing risks, determining an acceptable risk level, establishing a baseline for security, and implementing appropriate countermeasures.
- Major Sources of Threats:
- Temperature: Extreme heat or cold that can affect equipment and personnel.
- Gases: Harmful gases that can cause damage or pose health risks.
- Liquids: Water or other liquids that can lead to flooding or equipment damage.
- Organisms: Viruses and bacteria that can impact health or systems.
- Projectiles: Cars, trucks, bullets, and other objects that can cause physical damage.
- Movement: Structural collapse, earthquakes, and other forms of movement that can lead to damage or injury.
- Energy: Radioactivity, radiation, and other forms of energy that can be hazardous.
Understanding these concepts is crucial for developing comprehensive security strategies that address a wide range of potential threats and vulnerabilities.