UID:
almafu_9959327396702883
Umfang:
1 online resource
ISBN:
9781119028406
,
111902840X
,
9781119028420
,
1119028426
,
9781118194638
,
1118194632
,
9781119028437
,
1119028434
Inhalt:
"Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
Anmerkung:
Title page; Table of Contents; Chapter 1: Introduction to Security Risk Assessment and Management; Introduction; Business Definition; Security Versus Risk; Framework for Risk Management; Value at Risk; Calculation of Risk; Risk Assessment Versus Risk Management; Risk Management Plans; Threat Scenarios; Statistics and Mathematics; Pairing Vulnerability and Threat Data; Setting Priorities; Other Definitions of Risk Assessment; Business Definition for Risk Assessment; Broad Definition for Risk Assessment; Quantitative Risk Assessment; Qualitative Risk Assessment.
,
Countermeasures for VulnerabilitiesSample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario No. 2; Chapter 2: Risk Assessment Basics; Street Calculus and Perceived Risk; Security Risk Assessment Structure; Value at Risk; Sandia Laboratory's Risk Assessment Analysis; Annualized Cost Analysis of Risk; Scenario-driven Cost Risk Analysis3; Model-Based Risk Analysis; Risk Management by Fault Tree Methods and Risk-informed Decision management; Chapter 3: Assessing Types of Attacks and Threats with Data Sources; Weapons; Muzzle Energies for Various Cartridges; Rifle Grenades.
,
Rocket-Propelled Grenades and MortarsExplosive Energies; Other Types of Incidents and Accidents; Chapter 4: Evaluating a Company's Protective Systems; Surveys and Assessments; Site Security Assessments; Lighting; Perimeter Barriers: Design Notes and Comments; CCTV; Windows and Doors; Chapter 5: Port Security; Ranking Threats; Levels of Port Security; Identification Procedures for Personnel Screening; Vessel Arrival and Security Procedures While Moored; Internal Security; Perimeter Security and Restricted Areas; Lighting; Security Alarms/Video Surveillance/Communications Systems.
,
Training and Security AwarenessFloating Barriers; Chapter 6: Basics of Cyber security; Communications Life Cycle; Some Solutions to the Problem of Cyber crime; Communications Security; Communications as Transactions; Telephone System Security; Radio Communications; Digital Communications; Cyber security; How to Perform the Vulnerability Assessment; Communications Procedure Design: Hints and Helps; Benefits: Identified; Cyber Threat Matrix: Categories of Loss and Frequency; Setting up Internet Security; Cyber security Tools; Chapter 7: Scenario Planning and Analyses; Introduction.
,
FTA, Markov Chains, and Monte Carlo MethodsOther Complimentary Techniques; Sample of Initial Analysis; Failure Modes and Effects Analysis; DHS Analysis and Plans; Bow-tie Analysis; HAZOPS and Process Safety Management; ALOHA, CAMEO, and Security Planning Tools; The Colored Books; Chapter 8: Security System Design and Implementation: Practical Notes; Security Threat-Level Factors; Considered Factors; Security System Design; Electronic Security Systems Design; Review and Assessment of Engineering Design and Implementation; Conclusion; Appendix I: Physical Security Checklist; Building.
Weitere Ausg.:
Print version: Russell, David L., 1942- Industrial security. Hoboken, New Jersey : John Wiley & Sons Inc., 2015 ISBN 9781118194638
Sprache:
Englisch
Schlagwort(e):
Electronic books.
;
Electronic books.
URL:
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119028437
URL:
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119028437
Bookmarklink