Normal view MARC view ISBD view

Threat assessment and risk analysis : an applied approach

By: Allen, Gregory
Title By: Derr, Rachel
Material type: BookPublisher: Amsterdam : Butterworth-Heinemann is an imprint of Elsevier, c2016.Description: vii, 147 p. : ill. ; 24 cm.ISBN: 978-0128022245Subject(s): Risk management | Threats -- Prevention | Violence in the workplace -- Prevention | Corporations -- Security measures | Behavioral assessment | BUSINESS & ECONOMICS / Industrial Management | BUSINESS & ECONOMICS / Management | BUSINESS & ECONOMICS / Management Science | BUSINESS & ECONOMICS / Organizational BehaviorDDC classification: . Online resources: Location Map
Summary:
Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book explores physical vulnerabilities in such systems as transportation, distribution, and communications, and demonstrates how to measure the key risks and their consequences, providing cost-effective and achievable methods for evaluating the appropriate security risk mitigation countermeasures. Users will find a book that outlines the processes for identifying and assessing the most essential threats and risks an organization faces, along with information on how to address only those that justify security expenditures. Balancing the proper security measures versus the actual risks an organization faces is essential when it comes to protecting physical assets. However, determining which security controls are appropriate is often a subjective and complex matter. The book explores this process in an objective and achievable manner, and is a valuable resource for security and risk management executives, directors, and students. * Guides readers from basic principles to complex processes in a logical, building block fashion* Provides a clear, step-by-step process for performing a physical security threat and risk analysis for any organization * Covers quantitative and qualitative risks such as operational risk, legal risk, reputational risk, social risks, and economic risks* Utilizes the Department of Homeland Security risk assessment framework and best practices, including CARVER, API/NPRA, and RAMCAP.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)

""Front Cover""; ""Threat Assessment and Risk Analysis""; ""Copyright Page""; ""Contents""; ""1 Introduction to the Department of Homeland Security""; ""Introduction""; ""Homeland Security Platform""; ""Risk Analysis and Management for Critical Asset Protection""; ""Asset Characterization and Screening""; ""Threat Characterization""; ""Consequence Analysis""; ""Vulnerability Analysis""; ""Threat Assessment""; ""Risk Assessment""; ""Homeland Security Act of 2002""; ""Homeland Security Presidential Directives""; ""2 What is Risk?""; ""Introduction""; ""Understanding Physical Security Risk"" ""Risk Management""""Operational Risk""; ""Legal Risk (Information Security)""; ""ISO 17799 and BS 7799: The Key Components of the Standard""; ""Information Security Policy for the Organization""; ""Creation of Information Security Infrastructure""; ""Asset Classification and Control""; ""Personnel Security""; ""Physical and Environmental Security""; ""Communications and Operations Management""; ""Access Control""; ""System Development and Maintenance""; ""Business Continuity Management""; ""Compliance""; ""Reputational Risk""; ""Managing Reputational Risk""; ""3 Risk Analysis"" ""Introduction""""Physical Security Risk Assessments""; ""Risk Assessment Method""; ""Benefits of Security Assessments""; ""Executive Management Role in Risk Analysis""; ""4 Threat Identification and Rating""; ""Introduction""; ""All-Hazards Approach versus Design-Basis Threat""; ""All-Hazards Approach""; ""Design-Basis Threat""; ""Identifying Threats""; ""Information Gathering""; ""Jurisdictional Threat""; ""Identifying Hazards""; ""Natural Hazards""; ""Man-Made Hazards""; ""5 Risk Identification""; ""Introduction""; ""Assets""; ""Exposure""; ""Losses"" ""6 National Infrastructure Protection Plan and Critical Infrastructure and Key Resources""""Asset Identification and Prioritization""; ""National Infrastructure Protection Plan""; ""Reference""; ""7 Vulnerability Assessment""; ""Introduction""; ""Assessing Your Vulnerabilities""; ""Level of Visibility""; ""Criticality of Target Site to Jurisdiction""; ""Impact Outside of the Jurisdiction""; ""Potential Threat Element Access to the Target (Accessibility)""; ""Potential Target Threat of Hazard""; ""Potential Target Site Population""; ""Potential for Collateral Mass Casualties"" ""8 Vulnerabilities""""Physical Security Systems""; ""Physical Threat Monitoring""; ""Technology and Physical Security Blended: A Layered Approach""; ""The Physical Threat""; ""Theft (Physical and Virtual)""; ""Sabotage""; ""Human Error""; ""Environmental Disruption""; ""Employee Background Checks""; ""Use of Security Officers""; ""Emergency Action Plans""; ""Evacuation Procedures, Escape Routes, and Floor Plans""; ""Emergencies Outside of the Building""; ""Emergencies Within the Building""; ""Health Emergencies""; ""Reporting and Alerting Authorities.

Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book explores physical vulnerabilities in such systems as transportation, distribution, and communications, and demonstrates how to measure the key risks and their consequences, providing cost-effective and achievable methods for evaluating the appropriate security risk mitigation countermeasures. Users will find a book that outlines the processes for identifying and assessing the most essential threats and risks an organization faces, along with information on how to address only those that justify security expenditures. Balancing the proper security measures versus the actual risks an organization faces is essential when it comes to protecting physical assets. However, determining which security controls are appropriate is often a subjective and complex matter. The book explores this process in an objective and achievable manner, and is a valuable resource for security and risk management executives, directors, and students. * Guides readers from basic principles to complex processes in a logical, building block fashion* Provides a clear, step-by-step process for performing a physical security threat and risk analysis for any organization * Covers quantitative and qualitative risks such as operational risk, legal risk, reputational risk, social risks, and economic risks* Utilizes the Department of Homeland Security risk assessment framework and best practices, including CARVER, API/NPRA, and RAMCAP.

Powered by Koha