Page 164 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 164

(caused by relying on events or items that don’t exist)

                    Criminal activities by authorized users (espionage, IP theft,
                    embezzlement, etc.)


                    Movement (vibrations, jarring, etc.)

                    Intentional attacks

                    Reorganization

                    Authorized user illness or epidemics

                    Malicious hackers

                    Disgruntled employees

                    User errors

                    Natural disasters (earthquakes, floods, fire, volcanoes, hurricanes,
                    tornadoes, tsunamis, and so on)

                    Physical damage (crushing, projectiles, cable severing, and so on)


                    Misuse of data, resources, or services

                    Changes or compromises to data classification or security policies

                    Government, political, or military intrusions or restrictions

                    Processing errors, buffer overflows

                    Personnel privilege abuse

                    Temperature extremes

                    Energy anomalies (static, EM pulses, radio frequencies [RFs],
                    power loss, power surges, and so on)

                    Loss of data

                    Information warfare


                    Bankruptcy or alteration/interruption of business activity

                    Coding/programming errors

                    Intruders (physical and logical)

                    Environmental factors (presence of gases, liquids, organisms, and
   159   160   161   162   163   164   165   166   167   168   169