Threat assessment and risk analysis : (Record no. 28161)

INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 978-0128022245
DEWEY DECIMAL CLASSIFICATION NUMBER
Call number .
MAIN ENTRY--PERSONAL NAME
Authors Allen, Gregory
TITLE STATEMENT
Title Threat assessment and risk analysis :
Subtitle an applied approach
Statement of responsibility, etc Gregory Allen, Rachel Derr
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Amsterdam :
Publisher Butterworth-Heinemann is an imprint of Elsevier,
Date c2016.
PHYSICAL DESCRIPTION
Extent vii, 147 p. :
Other Details ill. ;
Size 24 cm.
CONTENTS
Contents ""Front Cover""; ""Threat Assessment and Risk Analysis""; ""Copyright Page""; ""Contents""; ""1 Introduction to the Department of Homeland Security""; ""Introduction""; ""Homeland Security Platform""; ""Risk Analysis and Management for Critical Asset Protection""; ""Asset Characterization and Screening""; ""Threat Characterization""; ""Consequence Analysis""; ""Vulnerability Analysis""; ""Threat Assessment""; ""Risk Assessment""; ""Homeland Security Act of 2002""; ""Homeland Security Presidential Directives""; ""2 What is Risk?""; ""Introduction""; ""Understanding Physical Security Risk"" ""Risk Management""""Operational Risk""; ""Legal Risk (Information Security)""; ""ISO 17799 and BS 7799: The Key Components of the Standard""; ""Information Security Policy for the Organization""; ""Creation of Information Security Infrastructure""; ""Asset Classification and Control""; ""Personnel Security""; ""Physical and Environmental Security""; ""Communications and Operations Management""; ""Access Control""; ""System Development and Maintenance""; ""Business Continuity Management""; ""Compliance""; ""Reputational Risk""; ""Managing Reputational Risk""; ""3 Risk Analysis"" ""Introduction""""Physical Security Risk Assessments""; ""Risk Assessment Method""; ""Benefits of Security Assessments""; ""Executive Management Role in Risk Analysis""; ""4 Threat Identification and Rating""; ""Introduction""; ""All-Hazards Approach versus Design-Basis Threat""; ""All-Hazards Approach""; ""Design-Basis Threat""; ""Identifying Threats""; ""Information Gathering""; ""Jurisdictional Threat""; ""Identifying Hazards""; ""Natural Hazards""; ""Man-Made Hazards""; ""5 Risk Identification""; ""Introduction""; ""Assets""; ""Exposure""; ""Losses"" ""6 National Infrastructure Protection Plan and Critical Infrastructure and Key Resources""""Asset Identification and Prioritization""; ""National Infrastructure Protection Plan""; ""Reference""; ""7 Vulnerability Assessment""; ""Introduction""; ""Assessing Your Vulnerabilities""; ""Level of Visibility""; ""Criticality of Target Site to Jurisdiction""; ""Impact Outside of the Jurisdiction""; ""Potential Threat Element Access to the Target (Accessibility)""; ""Potential Target Threat of Hazard""; ""Potential Target Site Population""; ""Potential for Collateral Mass Casualties"" ""8 Vulnerabilities""""Physical Security Systems""; ""Physical Threat Monitoring""; ""Technology and Physical Security Blended: A Layered Approach""; ""The Physical Threat""; ""Theft (Physical and Virtual)""; ""Sabotage""; ""Human Error""; ""Environmental Disruption""; ""Employee Background Checks""; ""Use of Security Officers""; ""Emergency Action Plans""; ""Evacuation Procedures, Escape Routes, and Floor Plans""; ""Emergencies Outside of the Building""; ""Emergencies Within the Building""; ""Health Emergencies""; ""Reporting and Alerting Authorities.
SUMMARY
Summary Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book explores physical vulnerabilities in such systems as transportation, distribution, and communications, and demonstrates how to measure the key risks and their consequences, providing cost-effective and achievable methods for evaluating the appropriate security risk mitigation countermeasures. Users will find a book that outlines the processes for identifying and assessing the most essential threats and risks an organization faces, along with information on how to address only those that justify security expenditures. Balancing the proper security measures versus the actual risks an organization faces is essential when it comes to protecting physical assets. However, determining which security controls are appropriate is often a subjective and complex matter. The book explores this process in an objective and achievable manner, and is a valuable resource for security and risk management executives, directors, and students. * Guides readers from basic principles to complex processes in a logical, building block fashion* Provides a clear, step-by-step process for performing a physical security threat and risk analysis for any organization * Covers quantitative and qualitative risks such as operational risk, legal risk, reputational risk, social risks, and economic risks* Utilizes the Department of Homeland Security risk assessment framework and best practices, including CARVER, API/NPRA, and RAMCAP.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Risk management
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Threats
General Prevention
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Violence in the workplace
General Prevention
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Corporations
General Security measures
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Behavioral assessment
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading BUSINESS & ECONOMICS / Industrial Management
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading BUSINESS & ECONOMICS / Management
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading BUSINESS & ECONOMICS / Management Science
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading BUSINESS & ECONOMICS / Organizational Behavior
ADDED ENTRY
Name Derr, Rachel
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://uowd.box.com/s/vshdnew6ca392r1lq9di4300y10inyeb
Public note Location Map
MAIN ENTRY--PERSONAL NAME
-- 63829
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 199
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 63830
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 63831
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 38722
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 6491
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 2021
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 301
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 2022
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 2023
ADDED ENTRY
-- 63832
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Source of acquisition Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2015-12-07 AMAUK 658.155 AL TH T0053147 2017-01-26 33.29 2017-01-26 REGULAR

Powered by Koha