My Account Log in

4 options

Strategic security management : a risk assessment guide for decision makers / Karim H. Vellani.

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost eBook Community College Collection Available online

View online

Ebook Central Academic Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Vellani, Karim H., 1971-
Language:
English
Subjects (All):
Industries--Security measures--Management.
Industries.
Risk assessment.
Information technology--Security measures.
Information technology.
Management information systems--Security measures.
Management information systems.
Physical Description:
1 online resource (413 p.)
Edition:
1st edition
Place of Publication:
Amsterdam ; Boston : Butterworth-Heinemann, c2007.
Language Note:
English
System Details:
text file
Summary:
Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organization's assets, giving decision makers the foundation needed to climb the next step up the corporate ladder.Strategic Security Management fills a definitive need for guidel
Contents:
Front cover; Title page; Copyright page; Table of contents; About the Author; Contributing Authors; Acknowledgments; Introduction; Chapter 1: Data-Driven Security; Data-Driven Security; Security Metrics; SMART Metrics; Data-Driven Assessments; Chapter 2: Asset Identification and Security Inventory; Definitions; Asset Classification; Identifying Critical Assets; Target Selection; Consequence Analysis; Countermeasure Inventory; Security Assessments; Chapter 3: Threat Assessments; Threat Formula; Threat Identification and Classification; Threat Information Sources; Assessing Threats
Emerging ThreatsThreat Dynamics; The Homeland Security Advisory System; Chapter 4: Crime Analysis; Statistics for Security Management; Crime Triangle; Purpose of Crime Analysis; Data Sources; Law Enforcement Data versus Social Disorder Models; Advantages of Law Enforcement Data; Geographic Levels; Methodology; Return on Security Investment (ROSI); Chapter 5: Vulnerability Assessments; Definition; Vulnerability Assessments; Scope of Vulnerability Assessments; The Vulnerability Assessment Team; Asset-Based and Scenario-Based Vulnerability Assessments; Vulnerability Assessment Steps
Vulnerability Rating ScaleThe Security Survey Report; The Vulnerability Assessment Report; Chapter 6: Risk Assessments; Definition; Risk Assessments; Qualitative Risk Assessments; Quantitative Risk Assessments; Specialized Risk Assessment Methodologies; Risk Mitigation; Risk Assessment Report; Chapter 7: Information Technology Risk Management; Why Information Technology Security Is Important to Traditional Security Decision Makers; Information Technology Risk Management; Asset Identification; Information Technology Risk Assessment; Information Technology System Characterization
Threat AssessmentVulnerability Assessment; Control Evaluation; Likelihood Determination; Impact Analysis; Risk Determination; Control Recommendations; Results Documentation; Risk Mitigation; Control Implementation Methodology; Control Categories; Cost-Benefit Analysis; Residual Risk; Evaluation and Refinement; Chapter 8: Prevention; The Need and Practical Application of Theoretical Study; Situational Crime Prevention; Rational Choice; Routine Activity; Crime Prevention Through Environmental Design (CPTED); Crime Displacement and Diffusion of Benefits; Prevention Measures
Chapter 9: Security Measures: Policies and ProceduresSecurity Awareness; Security Plan; Emergency Management Plan; Conclusion; Chapter 10: Security Measures: Physical Security; Introduction; Types of Physical Security Countermeasures; Integration of Multiple Physical Security Countermeasures; Integration of Physical Security Countermeasures with Personnel and Policies and Procedures Countermeasures; Determining Physical Security Countermeasure Needs; Matching Product to Need; Defining Cost and Cost-Benefit Analysis; Cost-Benefit Analysis; Best Practices; Codes and Ordinances; Summary
Chapter 11: Security Measures: Deploying Physical Security
Notes:
Description based upon print version of record.
Includes bibliographical references (p. 357-373) and index.
ISBN:
9786610707676
9781280707674
1280707674
9780080465968
008046596X
OCLC:
476027834

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account