• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2022 ■ William Bailey
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos

Unit #6 – Question 3

September 21, 2022 by William Bailey 21 Comments

A company’s physical security team analyzed physical security threats and vulnerabilities for its systems. What types of vulnerabilities did the company focus on?

Filed Under: Unit 06: Physical and Environmental Security Tagged With:

Reader Interactions

Comments

  1. Nicholas Foster says

    September 25, 2022 at 2:52 pm

    There are three factors that should be analyzed for physical security threats and vulnerabilities for it’s systems. These are administrative (human-driven), environmental, and technical. The administrative side would be misuse of or unauthorized access of the system and it’s controls. Environmental would be weather/internal and external temperature/internal and external humidity levels, and related environmental events such as flooding, hurricanes, wildfires, etc. Technical would fall to things like power (voltage) and any possible interference such a electromagnetic. The reading from Vacca outlines polices that should be implemented to help combat these vulnerabilities. These can be summarized into who is accessing the company’s resources (perimeter defense), what are they doing with these resources (asset protection), and environmental monitoring both internally (temperature/humidity) as well as externally (natural disasters).

    Log in to Reply
    • Kenneth Saltisky says

      September 27, 2022 at 8:31 pm

      Hi Nicholas,
      I like your summarization of the policies that should be implemented to combat physical security vulnerabilities. This covers a good amount of potential vulnerabilities in relation to physical security.

      Log in to Reply
  2. Jill Brummer says

    September 25, 2022 at 11:02 pm

    After a company’s physical security team analyzed physical security threats and vulnerabilities for its systems, some types of vulnerabilities the company focused on were related to the Environmental, Technical, and Human-caused physical threats. Some vulnerabilities related to these threats that the company should focus on are the following:
    – Not minimizing risk by choosing a site that is not at high risk for natural disaster
    – Store paper files and records in the IS area, instead store them in fireproof cabinets
    – Records needed for reconstruction, not stored off site
    – Didn’t have up-to-date duplicate of all programs
    – Didn’t have a power off switch
    – Didn’t have a contingency plan for use of equipment in case computer are destroyed
    – Didn’t have smoke detectors and raised floors
    – Didn’t have layout of water supply lines
    – Didn’t have shutoff valves
    – Didn’t UPS should be employed for each piece of critical equipment
    – There were unauthorized insiders/employees that had access to equipment
    – Security device controls the power switch
    – There wasn’t a centralized location for all alerts and alarms

    It is important for a company to not only protect against the threats, but also protect and mitigate the risk of the vulnerabilities.

    Log in to Reply
  3. Matthew Stasiak says

    September 26, 2022 at 5:22 pm

    The company focused on physical unauthorized access and system interferences. The remaining mitigation involves physical and environmental and equipment security. Physical and environmental would involve natural disasters that might cause data centers or other access to be halted. Equipment security typically refers to the technical aspects such as unauthorized access whether physical or digital.

    Log in to Reply
    • Kenneth Saltisky says

      September 27, 2022 at 8:34 pm

      Hi Matthew,
      I would add potential power outages or technical interferences caused by malicious individuals as a potential vulnerability since it is also an important consideration that combines physical and environmental factors.

      Log in to Reply
  4. Christa Giordano says

    September 26, 2022 at 9:51 pm

    The company’s focus was on physical security threats and vulnerabilities, the assessment considered Environmental, Technical, and Human-caused vulnerabilities. Environmental vulnerabilities include natural disasters such as hurricanes and blizzards, fire, smoke, and water damage, temperature and humidity concerns and chemical, radiological and biological such as anthrax or ricin. Technical vulnerabilities include electricity such as outages, undercurrents or overcurrents, which can usually be addressed by ensuring an uninterrupted power supply (UPS) is in place and electromagnetic interference from machinery, fans or power cords which could cause interference with a system. The most challenging vulnerability to address is the human element or human caused physical threat which includes unauthorized access, theft, vandalism, and misuse of assets. Unauthorized access can encompass all entry points into the building such as main entrance, exits, attached parking garages, delivery bays, egress and fire exits, balconies, etc.

    Log in to Reply
    • Jill Brummer says

      September 29, 2022 at 9:56 pm

      I agree with your summary and absolutely agree with the point you made about the most challenging vulnerability is the human element. I also haven’t thought about the radiological and biological vulnerabilities, but that is also a very good point that may easily be overlooked due to it isn’t usually high on the list or even mentioned as vulnerability.

      Log in to Reply
    • Nicholas Foster says

      September 30, 2022 at 5:56 pm

      Christa I like that you included chemical, radiological and biological related vulnerabilities. I then instantly thought of gamma rays. That was something I didn’t take into consideration originally but if you work for a company that regularly deals with these hazards it makes sense to incorporate them in your list of possible vulnerabilities. One that comes to mind immediately are nuclear power plants that leverage uranium. Nuclear radiation can act almost like an EMP.

      Log in to Reply
  5. David Vanaman says

    September 27, 2022 at 5:35 pm

    A company’s physical security team analyzed physical security threats and vulnerabilities for its systems. What types of vulnerabilities did the company focus on?

    A physical threat assessment would focus on two major categories: access and power. Access is the ability for someone to get from the public sidewalk to physical proximity to data storage and remove it (results in loss of confidentiality and availability). What prevents a person from walking out of the building with a hard drive, file folder, or workstation? Vulnerabilities to focus on would be those that allow access into the building and once inside, into more secure areas where data is stored. Mitigations to consider include fences, locks, cameras, guards, limited access areas, and other impediments to unauthorized access.
    Power addresses a loss of availability due to power outage. This can be from a natural disaster, accident, or malicious action. One of the most common remediation to power outage is having an onsite backup generator or an offsite hot backup.

    Log in to Reply
  6. Shepherd Shenjere says

    September 27, 2022 at 5:53 pm

    According to VACCA, “Human-Caused Physical Threats are more difficult to deal with than Environmental and Technical threats.” So, it is key for company to focus on threats such as unauthorized physical access, theft, vandalism, and misuse. As discussed by VACCA all these threats must be addressed thoroughly, because it involves humans and has the power to control and takeover everything, and human-caused threats are less predictable than other types of physical threats.

    Log in to Reply
    • Kenneth Saltisky says

      September 27, 2022 at 8:41 pm

      Hi Shepherd,
      I agree that human-caused threats are more difficult to prepare for since there are more possibilities and room for manipulation. Environmental factors can be predictable and technical, although possible to manipulate by humans, can be prepared and mitigated easier than human-related risks.

      Log in to Reply
    • Abayomi Aiyedebinu says

      September 28, 2022 at 2:53 pm

      Hi Shepherd,

      Human caused physical threat are more difficult to deal with especially if the insider threat is malicious and they have access and authorization to key component of the IT infrastructure of the company.

      Log in to Reply
    • Matthew Stasiak says

      October 3, 2022 at 5:18 pm

      I totally agree. Natural disasters can usually be prepared for and slightly mitigated. On the other hand, physical threats are expected but the company never knows at what time or how bad it will hit.

      Log in to Reply
  7. Kenneth Saltisky says

    September 27, 2022 at 8:26 pm

    Physical security teams should focus on two types of vulnerabilities: human and environmental. Human vulnerabilities would be potential unauthorized access or the misuse of controls put in place. Environmental vulnerabilities would include if anything is susceptible to natural disasters and what precautions are in place to mitigate these threats. This can also include malicious threats by others that include environmental threats, such as a power outage or starting a fire.

    Log in to Reply
    • Abayomi Aiyedebinu says

      September 28, 2022 at 2:55 pm

      Hi Kenneth,

      I agree with you organizations should have a preparedness mechanism in place to mitigate against environmental vulnerabilities that could happen

      Log in to Reply
    • Shepherd Shenjere says

      September 30, 2022 at 6:56 pm

      Hello Kenneth,
      I like that you also spoke about environmental vulnerabilities that involves natural disasters. So, it should be a focal point for organizations to identify a suitable location to run their business.

      Log in to Reply
  8. Abayomi Aiyedebinu says

    September 28, 2022 at 2:52 pm

    Physical security team should focus on human and environmental threat. Human error is inevitable therefore adequate controls should be put in place to mitigate the risk posed by human. However, some of these risks are non-malicious but they can lead to vulnerabilities that can be exploited. In addition to that every organization should have a preparedness mechanism to tackling issues relating to environmental hazards and disaster especially with regards to cooling systems in a bid to avoid corrosion. Technical threat should not be left out because it poses a physical threat to IT infrastructure a typical example is the electromagnetic discharge and obstruction.

    Log in to Reply
    • Maxwell ODonnell says

      September 30, 2022 at 1:39 pm

      I like that you mention often that human error is non-malicious, it’s often people with the best intentions can end up doing harm. A simple lapse in security-aware judgment, just trying to do the right thing and making an exception to policy (i.e. giving out a password, holding a door, etc) can open up a vulnerability and lead to a breach.

      Log in to Reply
  9. Maxwell ODonnell says

    September 28, 2022 at 4:49 pm

    A company focusing on physical security threats and vulnerabilities would have to focus on a variety of things like technical components, access, human and environmental. Technical problems have to do with power access, and the availability of power, the security team would want to ensure backup power in the event of an outage as well as having the requisite safeguards in place in the event of a power surge. Access has to do with managing who has access to where the data is being stored and how that access is granted. Human threats have to do with human-based attacks, thefts, or misuse of data. Lastly, environmental threats have a lot in common with technical threats because they mostly pertain to natural disasters that can cause outages or damage to physical assets.

    Log in to Reply
    • Jill Brummer says

      September 29, 2022 at 9:58 pm

      I agree with your summary and all of the vulnerabilities you have listed as what the company would focus on. I do think that it’s important to note that the human threats and vulnerabilities are the most difficult to protect against.

      Log in to Reply
  10. Samuel Omotosho says

    October 5, 2022 at 5:10 am

    The company chooses to focus on a firewall’s susceptibility that might allow hackers to enter a computer network. Without particular procedures in place, the security of the organization system might be compromised. For instance, when the computer is linked to an insecure network, the lack of updates, inferior products, and unsolved development issues expose the organization to serious computer security risks.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in