| 
                           
                              | 
                                       Franklin N. Platt
                                          | Chapter 14 – | Physical Threats to the Information Infrastructure |  
 Chapter Contents:
 
 
 
                                       
                                          |  | 14.1 |  | Introduction |  
                                          |  | 14.2 |  | Background and Perspective |  
                                          |  | 14.2.1 |  | Today's Risks Are Greater |  
                                          |  | 14.2.2 |  | Likely Targets |  
                                          |  | 14.2.3 |  | Productivity Issues |  
                                          |  | 14.2.4 |  | Terrorism and Violence Are Now Serious Threats |  
                                          |  | 14.2.5 |  | Costs of a Threat Happening |  
                                          |  | 14.2.6 |  | Who Must Be Involved? |  
                                          |  | 14.2.7 |  | A Standard Process |  
                                          |  | 14.2.8 |  | Liability Issues |  
                                          |  | 14.2.9 |  | Definitions and Terms |  
                                          |  | 14.3 |  | Threat Assessment Process |  
                                          |  | 14.3.1 |  | Set Up a Steering Committee |  
                                          |  | 14.3.2 |  | Sources of Information and Assistance |  
                                          |  | 14.3.3 |  | Identify All Possible Threats |  
                                          |  | 14.3.4 |  | Determine the Likelihood of Each Threat |  
                                          |  | 14.3.5 |  | Approximate the Direct Costs |  
                                          |  | 14.3.6 |  | Consider Cascading Costs |  
                                          |  | 14.3.7 |  | Prioritize the Threats |  
                                          |  | 14.3.8 |  | Completing the Threat Assessment Report |  
                                          |  | 14.4 |  | General Threats |  
                                          |  | 14.4.1 |  | Natural Events |  
                                          |  | 14.4.1.1 |  | Blight |  
                                          |  | 14.4.1.2 |  | Building or Bridge Collapse |  
                                          |  | 14.4.1.3 |  | Dam Failure |  
                                          |  | 14.4.1.4 |  | Drought |  
                                          |  | 14.4.1.5 |  | Earthquake and Volcanic Eruption |  
                                          |  | 14.4.1.6 |  | Epidemic |  
                                          |  | 14.4.1.7 |  | Landslide |  
                                          |  | 14.4.1.8 |  | Flood |  
                                          |  | 14.4.1.9 |  | Hurricane or Tornado |  
                                          |  | 14.4.2 |  | Technical Events |  
                                          |  | 14.4.2.1 |  | Utility Disruptions |  
                                          |  | 14.4.2.2 |  | Physical Attacks |  
                                          |  | 14.4.2.3 |  | Coordinated Attacks |  
                                          |  | 14.4.2.4 |  | Hazardous Material (HAZMAT) Incidents |  
                                          |  | 14.4.2.5 |  | Radiological Incidents |  
                                          |  | 14.4.2.6 |  | Biological Hazards |  
                                          |  | 14.4.3 |  | Fire and Smoke |  
                                          |  | 14.4.4 |  | Water Leaks and Flooding |  
                                          |  | 14.4.5 |  | Environmental Problems |  
                                          |  | 14.4.5.1 |  | Dust |  
                                          |  | 14.4.5.2 |  | Humidity |  
                                          |  | 14.4.5.3 |  | Temperature |  
                                          |  | 14.4.5.4 |  | High-Intensity Radio-Frequency Flux |  
                                          |  | 14.4.6 |  | Utility Problems |  
                                          |  | 14.5 |  | Man-Made Threats |  
                                          |  | 14.5.1 |  | Accidents |  
                                          |  | 14.5.2 |  | Civil or Political Disorder |  
                                          |  | 14.6.3 |  | Wiring Runs and Exposed Wire |  
                                          |  | 14.5.4 |  | Intrusion |  
                                          |  | 14.5.5 |  | Wiretaps |  
                                          |  | 14.5.6 |  | High-Energy Radio-Frequency Weapons |  
                                          |  | 14.5.7 |  | Workplace Violence and Terrorism |  
                                          |  | 14.6 |  | Other Threats |  
                                          |  | 14.6.1 |  | Off-Hour Visitors |  
                                          |  | 14.6.2 |  | Storage Rooms |  
                                          |  | 14.6.3 |  | Medical Emergencies |  
                                          |  | 14.6.4 |  | Using an Illicit Terminal |  
                                          |  | 14.7 |  | Confidential Information About Threats |  
                                          |  | 14.8 |  | Summary |  
                                          |  | 14.9 |  | Notes |  
                                          |  | 14.10 |  | For Further Reading |  
 |  | 
                  
                     |  |