If an
114 journal of information security and applications 22 (2015) 113 e122
attacker can gain access to a targeted organization's offices e
e.g., in open-plan workspaces e they may find information
such as passwords written on Post-it notes. Less sophisticated
physical attacks involve theft or extortion to obtain information.