Human Threats: Theft Of Devices and Storage Media
Risk Description
Loss of Data, devices and IT infrastructure
Existing Controls
Security cameras and surveillance but very outdated and dilapidated
Risk Mitigation Policy
- Upgrade the Security cameras and surveillance system and ensure it works 24hours /7days.
- Implement security protocols for sensor placement, routine maintenance, and monitoring.
- Ensure backup power sources and redundancy in critical areas.
- Implement motion sensors, PIR and smart. access control in the data center and sensitive area. And implement the threshold of pre-configured alarm.
- The ability to review the access control log
- Restricted policies to reach out the data center and sensitive area.
Location/Contact Person details
The chairman of risk management sub-committee in UTAS-SUR
Dr.Sami Al-Batashi, Phone: +968 9293 9604
Email: sami.albattashi@utas.edu.om
Risk Management Authority
Risk Management Committee in UTAS-SUR
Risk Likelihood
Low
Risk Impact
Medium
Risk Level
Low
Risk Incident Response Procedures
- Verifying the thief through surveillance cameras, in addition to, entry and exit records.
- Stopping all systems and devices associated with the stolen device and prevent any possible communication from this stolen device.
- Installing a replacement for the stolen device.
- Restore the work to what it was and restore the data to the last shot before Device theft.
- Find the thief and move him/her to legal affairs
Risk Termination
By sending final report explained the problem causes and how we can mitigate next times.