Strategic security management a risk assessment guide for decision makers

Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fre...

Descripción completa

Detalles Bibliográficos
Autor principal: Vellani, Karim H., 1971- (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam ; Boston : Butterworth-Heinemann c2007.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627273406719
Tabla de Contenidos:
  • Front cover; Title page; Copyright page; Table of contents; About the Author; Contributing Authors; Acknowledgments; Introduction; Chapter 1: Data-Driven Security; Data-Driven Security; Security Metrics; SMART Metrics; Data-Driven Assessments; Chapter 2: Asset Identification and Security Inventory; Definitions; Asset Classification; Identifying Critical Assets; Target Selection; Consequence Analysis; Countermeasure Inventory; Security Assessments; Chapter 3: Threat Assessments; Threat Formula; Threat Identification and Classification; Threat Information Sources; Assessing Threats
  • Emerging ThreatsThreat Dynamics; The Homeland Security Advisory System; Chapter 4: Crime Analysis; Statistics for Security Management; Crime Triangle; Purpose of Crime Analysis; Data Sources; Law Enforcement Data versus Social Disorder Models; Advantages of Law Enforcement Data; Geographic Levels; Methodology; Return on Security Investment (ROSI); Chapter 5: Vulnerability Assessments; Definition; Vulnerability Assessments; Scope of Vulnerability Assessments; The Vulnerability Assessment Team; Asset-Based and Scenario-Based Vulnerability Assessments; Vulnerability Assessment Steps
  • Vulnerability Rating ScaleThe Security Survey Report; The Vulnerability Assessment Report; Chapter 6: Risk Assessments; Definition; Risk Assessments; Qualitative Risk Assessments; Quantitative Risk Assessments; Specialized Risk Assessment Methodologies; Risk Mitigation; Risk Assessment Report; Chapter 7: Information Technology Risk Management; Why Information Technology Security Is Important to Traditional Security Decision Makers; Information Technology Risk Management; Asset Identification; Information Technology Risk Assessment; Information Technology System Characterization
  • Threat AssessmentVulnerability Assessment; Control Evaluation; Likelihood Determination; Impact Analysis; Risk Determination; Control Recommendations; Results Documentation; Risk Mitigation; Control Implementation Methodology; Control Categories; Cost-Benefit Analysis; Residual Risk; Evaluation and Refinement; Chapter 8: Prevention; The Need and Practical Application of Theoretical Study; Situational Crime Prevention; Rational Choice; Routine Activity; Crime Prevention Through Environmental Design (CPTED); Crime Displacement and Diffusion of Benefits; Prevention Measures
  • Chapter 9: Security Measures: Policies and ProceduresSecurity Awareness; Security Plan; Emergency Management Plan; Conclusion; Chapter 10: Security Measures: Physical Security; Introduction; Types of Physical Security Countermeasures; Integration of Multiple Physical Security Countermeasures; Integration of Physical Security Countermeasures with Personnel and Policies and Procedures Countermeasures; Determining Physical Security Countermeasure Needs; Matching Product to Need; Defining Cost and Cost-Benefit Analysis; Cost-Benefit Analysis; Best Practices; Codes and Ordinances; Summary
  • Chapter 11: Security Measures: Deploying Physical Security