Page 164 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 164
(caused by relying on events or items that don’t exist)
Criminal activities by authorized users (espionage, IP theft,
embezzlement, etc.)
Movement (vibrations, jarring, etc.)
Intentional attacks
Reorganization
Authorized user illness or epidemics
Malicious hackers
Disgruntled employees
User errors
Natural disasters (earthquakes, floods, fire, volcanoes, hurricanes,
tornadoes, tsunamis, and so on)
Physical damage (crushing, projectiles, cable severing, and so on)
Misuse of data, resources, or services
Changes or compromises to data classification or security policies
Government, political, or military intrusions or restrictions
Processing errors, buffer overflows
Personnel privilege abuse
Temperature extremes
Energy anomalies (static, EM pulses, radio frequencies [RFs],
power loss, power surges, and so on)
Loss of data
Information warfare
Bankruptcy or alteration/interruption of business activity
Coding/programming errors
Intruders (physical and logical)
Environmental factors (presence of gases, liquids, organisms, and

