Theft is the act of stealing specifically: the felonious taking and removing of personal property with intent to deprive the rightful owner of it. Theft involves attempts made to remove assets from a facility, from a variety of different attacks. Generally, theft is executed by individuals who wish to wish to remain undetected and can be from either insiders or outsiders to the organization.
Theft contains 9 profiles to describe this threat.
|Outsider||Remove||Evade||On Site||No Equipment||Present|
|Invitee||Remove||Evade||On Site||No Equipment||Present|
|Insider||Remove||Evade||On Site||No Equipment||No Vehicle|
|Outsider||Remove||Evade||On Site||No Equipment||Essential|
|Invitee||Remove||Evade||On Site||No Equipment||Essential|
|Insider||Remove||Evade||On Site||No Equipment||Essential|
|Insider||Remove||Evade||On Site||No Equipment||Present|
|Outsider||Remove||Evade||On Site||No Equipment||No Vehicle|
|Invitee||Remove||Evade||On Site||No Equipment||No Vehicle|
All threats contain different profiles which describe their attributes. These attributes represent different types of attackers or threats. When Quill recommends measures, we compare the efficacy of these measures to the profiles of these threats to determine the reduction to risk achieved by implementation.
All threat profiles are comprised as a combination of these six attributes with one the following descriptors.
|Attacker||Insider, Outsider, Invitee|
|Goal||Destroy, Tamper, Remove|
|Evasion||Try, Evade, Do Not Evade|
|Presence||Preparation, On Site, Remote|
|Equipment||Common, Specialized, No Equipment|
|Vehicle||Present, Essential, No Vehicle|