Principles of Security

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Principles of Security - Activity

You are a security officer working for a medium-sized research company. You have
been assigned to guard the facility. Two incidents occur. The first, a well-known
manager walks out with a box of papers. The second, someone believed to be an
outsider assesses the company information and goes away with the company blue
prints for the next generation product.

1. Briefly list all security gaps, vulnerabilities, threats, risks, and exploits.

Management must be informed of the various kinds of threats facing the organization

A threat is an object, person, or other entity that represents a constant danger to an asset

By examining each threat category in turn, management effectively protects its information through
policy, education and training, and technology controls

1. Potential Acts of Human Error or Failure

Accidents, employee mistakes

2. Compromises to Intellectual Property

3. Deliberate Acts of Espionage or Trespass

4. Deliberate Acts of Information Extortion

5. Deliberate Acts of Sabotage or Vandalism

6. Deliberate Acts of Theft

7. Deliberate Software Attacks

8. Forces of Nature

9. Potential Deviations in Quality of Service from Service Providers

10. Technical Hardware Failures or Errors

11. Technical Software Failures or Errors

12. Technological Obsolescence

2. Describe how these incidents can be overcome

You might also like