- Home
- Search Result
Search Results
Filter
Topics
Industry
Threats
Article Type
Document Types
Showing results for could
Search instead for CoLP
176 results for "could"
Action Upon Discovery of any Suspicious Delivered Item
You could discover a suspicious item in a mail room, or anywhere else in the building - ensure you have appropriate emergency response plans in place
State Threats Academia
Foreign governments could use their intelligence services and their economic power to target your research. Secure your success
Chemical, Biological, Radiological, Nuclear (CBRN) - Threat Methodology
CBRN encompasses a vast range of potential attack methodologies that could cause both harm to people and, potentially, damage to infrastructure
Insider Risk Simulation exercise
Effective communication is a vital part of responding to an insider event. To help organisations experience what this could feel like, the National Protective Security Authority (NPSA) has launched ne...
Geography and ownership risks for users
Managed hosting or cloud hosting providers sometimes seek to store your data in multiple locations, including outside the UK. When this happens, it is important you know where your data is stored, sin...
Personnel security risk assessment - A Guide, 4th Edition PDF
Guidance to help risk management practitioners conduct personnel security risk assessments. Personnel security risk assessment focuses on employees, their access to their organisation’s assets, the ri...
Protection of Infrastructure
Protective security is important for a site’s own infrastructure which is crucial for it to function or could present hazards if attacked.
Open Data: Adopting a Security-Minded Approach (Full version) PDF
This guidance provides a framework for adopting a security-minded approach to the sharing and publication of data which could be exploited by those with hostile or malicious intent. Its purpose is not...
Open Data: The Need for a Security Minded Approach (Summary) PDF
This guidance - published in summary and in full - provides a framework for adopting a security-minded approach to the sharing and publication of that data which could be exploited by those with hosti...
Introduction to PAS 97 PDF
PAS 97 specifies measures to assist businesses and other organizations in identifying and minimizing the impact of items of mail that represent a threat, or could otherwise cause concern or disruption...
Protecting Against Terrorism
Security advice and good practice for any organisation looking to protect against the risk of a terrorist act or to limit the damage such an incident could cause.
SCA - End of life of a built asset PDF
A SCA should be undertaken at the end of life of a built asset, including a change of owner or occupier, where failure to take appropriate measures could result in precise details about security risks...