Thomas Hackner outlines the principles of physical threat assessment, looking at the issues and approvals that need to be considered in advance, and considering the outer and inner perimeter defences that ought to be examined as part of the assessment.
The content is taken from a presentation delivered to members of the Computer and Information Security Society at Plymouth University on 13 February 2013.
[(CC) BY-NC-SA 2.0 UK]