Freshly Printed - allow 10 days lead
Security Risk Assessment
Managing Physical and Operational Security
Evaluate the safety and security of any organization with this comprehensive how-to guide
John M. White (Author)
9780128002216, Elsevier Science
Paperback, published 23 October 2014
230 pages
23.4 x 19 x 1.6 cm, 0.39 kg
"White has created an excellent book with material drawn from the well of his experience...clearly a must-read for the inexperienced or nonsecurity professional who is faced with the task of conducting a security assessment." --ASIS Dynamics "...it was refreshing to see this book covered very little on IT and took a broader view of security risk assessment...Each section is presented in layman’s terms, with clear examples and some templates to help with the assessment. Score: 7 out of 10" --BCS.org, January 2015 "...takes you through a security risk assessment, from who will do it, how often it needs doing, and how long it takes...through the planning, the schedule and budget, and that wonderful word ‘deliverables’, how to gather information on risk, whether from staff surveys or interviews." --Professional Security Magazine Online, 2014
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessment is a fact-finding process that determines an organization’s state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it’s used, or how to evaluate what they have found. Security Risk Assessment offers security professionals step-by-step guidance for conducting a complete risk assessment. It provides a template draw from, giving security professionals the tools needed to conduct an assessment using the most current approaches, theories, and best practices.
Chapter 1: Introduction to Security Risk Assessments Chapter 2: Pre-Assessment Planning Chapter 3: Defining the Project Scope Chapter 4: Project Management Chapter 5: Information Gathering Chapter 6: Physical Security Assessment Chapter 7: Financial Assessment Chapter 8: Security Department Operations Chapter 9: Security Training Chapter 10: Security Vulnerability Identification Chapter 11: Workplace Violence Risks and Vulnerabilities Chapter 12: Law Enforcement’s Role Chapter 13: Security Technology Assessment Chapter 14: Crime or Loss Foreseeability Chapter 15: Crime Prevention Strategies Chapter 16: The Security Assessment Report
Subject Areas: Computer security [UR], Management & management techniques [KJM]