Which of the following options can be considered as Physical environment security risks in IT infrastructure?