Critical Incident Management

 < Day Day Up > 


There are many classification and analysis practices in identifying and classifying threats. Threats may be classified in many ways. Start the risk assessment by thinking outside the organization and consider the origin threats as having either human or natural causes.

Experience Note 

An accurate analogy is business structure compared to an onion. If you remove the onion's layers one at a time; you will go deeper and deeper until you reach its core.

So it is with your enterprise; identify and examine the risks on the periphery and work your way inward, eventually reaching the center. When you are trying to classify threats and their probability of happening, you will need percentages to determine such things as frequency, and the degree to which they affect assets. Following is a list of a few common threats and some resources that can be contacted to collect relevant information. When contacting these resources, it is suggested that you collect information relative to the threats' frequency, location, and degree of severity measured in a relevant time period for your locale.

Human threats, both internal and external to the organization, are the most unpredictable and potentially the most destructive. Human threats are more mobile, devious, and plentiful than natural threats. Imagine that one of your trusted system engineers becomes dispirited one day and resigns. If the engineer were malicious, can your imagination stretch far enough to conceive of the damage that could be done with knowledge of your operation? Another scenario of the "what-if" model is born.

The following categories are not intended to provide a comprehensive list of human-based attacks, but merely to serve as a reference. New attacks on technology emerge daily, as do their solutions. Here are a few examples of human-based threats:

There are also many legal threats that can have a very negative impact on a business' operation. If successful, these risks can be more devastating to the organization than the technological threats. Following are a few examples:

Experience Note 

Consider that a famous celebrity visited a hospital for treatment. During the celebrity's stay, hundreds of hospital staff accessed and reviewed her records without authorization or need. This is another court case that will be monetarily decided.

There are threats and vulnerabilities that can occur within an organization, regardless of management's intentions. Consider an Internet hosting facility with hundreds of servers in its communications center. The building is the size of a large warehouse and, having been recently constructed, has the latest and greatest innovations. The fire extinguishing equipment consists primarily of large tanks of inert argon gas. Its purpose is to flood a fire with the inert gas, displacing the oxygen and extinguishing the fire, thereby preserving equipment and data. This is a fine idea for preserving equipment and data; however, no one considered that there are people working in the communications center who will suffocate before they can reach an exit, due to the large size of the facility. This concept was subsequently analyzed in the "what-if" scenario. The extinguishing system was replaced with another that did not threaten the communications center employees.

Think of malicious employees who have an intimate knowledge of your business operation and are predisposed to do damage. No one is in a better position to commit acts of sabotage, if they are inclined.

Experience Note 

During the Industrial Revolution, European workers were afraid of losing their jobs to mechanization. In the affected countries, wooden shoes called sabot were worn. Workers were able to stop the machinery by throwing their shoes into the works; hence the word sabotage.

The threat posed by employees and former employees surpasses the other threats.


 < Day Day Up > 

Категории