SlideShare a Scribd company logo
1 of 2
Download to read offline
Types of physical situations or occurrences:
It is important to understand the spectrum of threats to information systems so that responsible
administrators can make sure that anticipation measures are widespread.The three types of
physical situations or occurrences that can constitute a threat to information systems within an
enterprise are:
1. Environmental threats:
Natural disasters are the source of a wide range of environmental threats to the information
processing facilities. It is possible to evaluate the risk of different types of natural disasters and
take suitable precautions so that catastrophic loss from natural disaster is prevented.
2. Technical threats:
These threats include electrical power, electromagnetic interference. Electrical power is
important for the operation of information system. All the electrical and electronic devices
require power without interuptions. Power utility problems like low voltage, high voltage and
noise may occur.
Example: Most of the computers are designed to withstand long-drawn-out voltage reductions of
about 20% without shutting down and without operational error. Therefore no damage occurs but
service is interrupted.
3. Human caused threats:
The human-caused threats are unauthorized physical access, theft, destruction of equipment or
data, mis-use of the resources. These threats are difficult to handle compared to environmental
and technical threats. The human caused threats are less predictable than other types of physical
threats.
Solution
Types of physical situations or occurrences:
It is important to understand the spectrum of threats to information systems so that responsible
administrators can make sure that anticipation measures are widespread.The three types of
physical situations or occurrences that can constitute a threat to information systems within an
enterprise are:
1. Environmental threats:
Natural disasters are the source of a wide range of environmental threats to the information
processing facilities. It is possible to evaluate the risk of different types of natural disasters and
take suitable precautions so that catastrophic loss from natural disaster is prevented.
2. Technical threats:
These threats include electrical power, electromagnetic interference. Electrical power is
important for the operation of information system. All the electrical and electronic devices
require power without interuptions. Power utility problems like low voltage, high voltage and
noise may occur.
Example: Most of the computers are designed to withstand long-drawn-out voltage reductions of
about 20% without shutting down and without operational error. Therefore no damage occurs but
service is interrupted.
3. Human caused threats:
The human-caused threats are unauthorized physical access, theft, destruction of equipment or
data, mis-use of the resources. These threats are difficult to handle compared to environmental
and technical threats. The human caused threats are less predictable than other types of physical
threats.

More Related Content

Similar to Types of physical situations or occurrencesIt is important to und.pdf

Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docxRunning head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
todd521
 
Pace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nmPace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nm
Edward Sargent
 

Similar to Types of physical situations or occurrencesIt is important to und.pdf (20)

H17 MAJOR GRID BLACKOUTS ANALYSIS EMERSON EDUARDO RODRIGUES.pdf
H17 MAJOR GRID BLACKOUTS ANALYSIS EMERSON EDUARDO RODRIGUES.pdfH17 MAJOR GRID BLACKOUTS ANALYSIS EMERSON EDUARDO RODRIGUES.pdf
H17 MAJOR GRID BLACKOUTS ANALYSIS EMERSON EDUARDO RODRIGUES.pdf
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
G41044251
G41044251G41044251
G41044251
 
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docxRunning head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Electrical maintenance and its relationship to safety
Electrical maintenance and its relationship to safetyElectrical maintenance and its relationship to safety
Electrical maintenance and its relationship to safety
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
Group 13
Group 13Group 13
Group 13
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )
 
Electrical maintenance
Electrical maintenanceElectrical maintenance
Electrical maintenance
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
introduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfintroduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdf
 
Responsibilities of the CSIRT--abss.pptx
Responsibilities of the CSIRT--abss.pptxResponsibilities of the CSIRT--abss.pptx
Responsibilities of the CSIRT--abss.pptx
 
Introduction Safety and hazard management
Introduction Safety and hazard managementIntroduction Safety and hazard management
Introduction Safety and hazard management
 
Work impacts on health their implications and management techniques
Work impacts on health their implications and management techniquesWork impacts on health their implications and management techniques
Work impacts on health their implications and management techniques
 
Security - Chapter 1.ppt
Security - Chapter 1.pptSecurity - Chapter 1.ppt
Security - Chapter 1.ppt
 
Computer Threat.pdf
Computer Threat.pdfComputer Threat.pdf
Computer Threat.pdf
 
Pace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nmPace it environmental-impact_and_control_sw_nm
Pace it environmental-impact_and_control_sw_nm
 
Pace IT - Environmental Impact and Control
Pace IT - Environmental Impact and ControlPace IT - Environmental Impact and Control
Pace IT - Environmental Impact and Control
 
Electrical Safety.pptx
Electrical Safety.pptxElectrical Safety.pptx
Electrical Safety.pptx
 

More from pritikulkarni20

The term illegal acts, refers to violations of laws or governmental .pdf
The term illegal acts, refers to violations of laws or governmental .pdfThe term illegal acts, refers to violations of laws or governmental .pdf
The term illegal acts, refers to violations of laws or governmental .pdf
pritikulkarni20
 
Strategic planning has long been used as a tool for transforming and.pdf
Strategic planning has long been used as a tool for transforming and.pdfStrategic planning has long been used as a tool for transforming and.pdf
Strategic planning has long been used as a tool for transforming and.pdf
pritikulkarni20
 
Mandibles refer to the feeding appendages (or jaws) using which food.pdf
Mandibles refer to the feeding appendages (or jaws) using which food.pdfMandibles refer to the feeding appendages (or jaws) using which food.pdf
Mandibles refer to the feeding appendages (or jaws) using which food.pdf
pritikulkarni20
 

More from pritikulkarni20 (20)

When the butanol is protonated, it is ionic and hence more soluble .pdf
 When the butanol is protonated, it is ionic and hence more soluble .pdf When the butanol is protonated, it is ionic and hence more soluble .pdf
When the butanol is protonated, it is ionic and hence more soluble .pdf
 
Where is the reaction See what is the no. of m.pdf
                     Where is the reaction  See what is the no. of m.pdf                     Where is the reaction  See what is the no. of m.pdf
Where is the reaction See what is the no. of m.pdf
 
viscous increases due to bulkiness and interlocki.pdf
                     viscous increases due to bulkiness and interlocki.pdf                     viscous increases due to bulkiness and interlocki.pdf
viscous increases due to bulkiness and interlocki.pdf
 
The factors which affect are H bond Electronegat.pdf
                     The factors which affect are H bond Electronegat.pdf                     The factors which affect are H bond Electronegat.pdf
The factors which affect are H bond Electronegat.pdf
 
The compund with the lowest value of Ksp will pre.pdf
                     The compund with the lowest value of Ksp will pre.pdf                     The compund with the lowest value of Ksp will pre.pdf
The compund with the lowest value of Ksp will pre.pdf
 
SO4 2- ---sulphate ion H2SO4---2H+ +SO4 2- conce.pdf
                     SO4 2- ---sulphate ion H2SO4---2H+ +SO4 2- conce.pdf                     SO4 2- ---sulphate ion H2SO4---2H+ +SO4 2- conce.pdf
SO4 2- ---sulphate ion H2SO4---2H+ +SO4 2- conce.pdf
 
pKb = 4.7 pOH = 4.7 + log 0.20 0.25 =4.6 pH = 1.pdf
                     pKb = 4.7 pOH = 4.7 + log 0.20  0.25 =4.6 pH = 1.pdf                     pKb = 4.7 pOH = 4.7 + log 0.20  0.25 =4.6 pH = 1.pdf
pKb = 4.7 pOH = 4.7 + log 0.20 0.25 =4.6 pH = 1.pdf
 
Pouring the product on ice has two effects Firs.pdf
                     Pouring the product on ice has two effects  Firs.pdf                     Pouring the product on ice has two effects  Firs.pdf
Pouring the product on ice has two effects Firs.pdf
 
pH = pka + log ( [salt[[acid]) = 4.76 + log ( 0..pdf
                     pH = pka + log ( [salt[[acid]) = 4.76 + log ( 0..pdf                     pH = pka + log ( [salt[[acid]) = 4.76 + log ( 0..pdf
pH = pka + log ( [salt[[acid]) = 4.76 + log ( 0..pdf
 
NH3 is lewis base according to lewis electron pai.pdf
                     NH3 is lewis base according to lewis electron pai.pdf                     NH3 is lewis base according to lewis electron pai.pdf
NH3 is lewis base according to lewis electron pai.pdf
 
Li has high reduction potential than Cobalt ther.pdf
                     Li has high reduction potential than Cobalt  ther.pdf                     Li has high reduction potential than Cobalt  ther.pdf
Li has high reduction potential than Cobalt ther.pdf
 
Has two binding sites for oxygen .pdf
                     Has two binding sites for oxygen                 .pdf                     Has two binding sites for oxygen                 .pdf
Has two binding sites for oxygen .pdf
 
The term illegal acts, refers to violations of laws or governmental .pdf
The term illegal acts, refers to violations of laws or governmental .pdfThe term illegal acts, refers to violations of laws or governmental .pdf
The term illegal acts, refers to violations of laws or governmental .pdf
 
Strategic planning has long been used as a tool for transforming and.pdf
Strategic planning has long been used as a tool for transforming and.pdfStrategic planning has long been used as a tool for transforming and.pdf
Strategic planning has long been used as a tool for transforming and.pdf
 
Sorry I didnt get the question what you postSolutionSorry I .pdf
Sorry I didnt get the question what you postSolutionSorry I .pdfSorry I didnt get the question what you postSolutionSorry I .pdf
Sorry I didnt get the question what you postSolutionSorry I .pdf
 
delta H = 282.1 = 164.2 KJ .pdf
                     delta H = 282.1 = 164.2 KJ                      .pdf                     delta H = 282.1 = 164.2 KJ                      .pdf
delta H = 282.1 = 164.2 KJ .pdf
 
Sella turcica is the depression in the sphenoid bone of the skull. S.pdf
Sella turcica is the depression in the sphenoid bone of the skull. S.pdfSella turcica is the depression in the sphenoid bone of the skull. S.pdf
Sella turcica is the depression in the sphenoid bone of the skull. S.pdf
 
P(child does not have a cavity) = (420)0.41 + (620)0.32 + (1020.pdf
P(child does not have a cavity) = (420)0.41 + (620)0.32 + (1020.pdfP(child does not have a cavity) = (420)0.41 + (620)0.32 + (1020.pdf
P(child does not have a cavity) = (420)0.41 + (620)0.32 + (1020.pdf
 
Ans 1)Difference- DNA is double stranded where as RNA is single .pdf
Ans 1)Difference- DNA is double stranded where as RNA is single .pdfAns 1)Difference- DNA is double stranded where as RNA is single .pdf
Ans 1)Difference- DNA is double stranded where as RNA is single .pdf
 
Mandibles refer to the feeding appendages (or jaws) using which food.pdf
Mandibles refer to the feeding appendages (or jaws) using which food.pdfMandibles refer to the feeding appendages (or jaws) using which food.pdf
Mandibles refer to the feeding appendages (or jaws) using which food.pdf
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Types of physical situations or occurrencesIt is important to und.pdf

  • 1. Types of physical situations or occurrences: It is important to understand the spectrum of threats to information systems so that responsible administrators can make sure that anticipation measures are widespread.The three types of physical situations or occurrences that can constitute a threat to information systems within an enterprise are: 1. Environmental threats: Natural disasters are the source of a wide range of environmental threats to the information processing facilities. It is possible to evaluate the risk of different types of natural disasters and take suitable precautions so that catastrophic loss from natural disaster is prevented. 2. Technical threats: These threats include electrical power, electromagnetic interference. Electrical power is important for the operation of information system. All the electrical and electronic devices require power without interuptions. Power utility problems like low voltage, high voltage and noise may occur. Example: Most of the computers are designed to withstand long-drawn-out voltage reductions of about 20% without shutting down and without operational error. Therefore no damage occurs but service is interrupted. 3. Human caused threats: The human-caused threats are unauthorized physical access, theft, destruction of equipment or data, mis-use of the resources. These threats are difficult to handle compared to environmental and technical threats. The human caused threats are less predictable than other types of physical threats. Solution Types of physical situations or occurrences: It is important to understand the spectrum of threats to information systems so that responsible administrators can make sure that anticipation measures are widespread.The three types of physical situations or occurrences that can constitute a threat to information systems within an enterprise are: 1. Environmental threats: Natural disasters are the source of a wide range of environmental threats to the information processing facilities. It is possible to evaluate the risk of different types of natural disasters and take suitable precautions so that catastrophic loss from natural disaster is prevented. 2. Technical threats:
  • 2. These threats include electrical power, electromagnetic interference. Electrical power is important for the operation of information system. All the electrical and electronic devices require power without interuptions. Power utility problems like low voltage, high voltage and noise may occur. Example: Most of the computers are designed to withstand long-drawn-out voltage reductions of about 20% without shutting down and without operational error. Therefore no damage occurs but service is interrupted. 3. Human caused threats: The human-caused threats are unauthorized physical access, theft, destruction of equipment or data, mis-use of the resources. These threats are difficult to handle compared to environmental and technical threats. The human caused threats are less predictable than other types of physical threats.