8

Vulnerabilities

Rachel Derr

Abstract

This chapter outlines how physical security systems and other physical security elements can assist in the protection of an organization by minimizing the vulnerabilities that threaten the target. The chapter discusses how physical threat monitoring, employee background checks, human guarding, technology, and a basic emergency action plan can assist in this process.

Keywords

intrusion; deter; detect; assess; respond; delay; networks; physical threat; theft; sabotage; Closed Caption Television (CCTV); emergency action plan (EAP); threat level; CBRNE; evacuation

Get Threat Assessment and Risk Analysis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.