Threat assessment and risk analysis an applied approach

Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book explores physical vulnerabilit...

Full description

Bibliographic Details
Other Authors: Allen, Gregory, author (author), Derr, Rachel, author
Format: eBook
Language:Inglés
Published: Oxford, England ; Waltham, Massachusetts : Butterworth Heinemann 2016.
Edition:1st edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629599106719
Table of Contents:
  • ""Front Cover""; ""Threat Assessment and Risk Analysis""; ""Copyright Page""; ""Contents""; ""1 Introduction to the Department of Homeland Security""; ""Introduction""; ""Homeland Security Platform""; ""Risk Analysis and Management for Critical Asset Protection""; ""Asset Characterization and Screening""; ""Threat Characterization""; ""Consequence Analysis""; ""Vulnerability Analysis""; ""Threat Assessment""; ""Risk Assessment""; ""Homeland Security Act of 2002""; ""Homeland Security Presidential Directives""; ""2 What is Risk?""; ""Introduction""; ""Understanding Physical Security Risk""
  • ""Risk Management""""Operational Risk""; ""Legal Risk (Information Security)""; ""ISO 17799 and BS 7799: The Key Components of the Standard""; ""Information Security Policy for the Organization""; ""Creation of Information Security Infrastructure""; ""Asset Classification and Control""; ""Personnel Security""; ""Physical and Environmental Security""; ""Communications and Operations Management""; ""Access Control""; ""System Development and Maintenance""; ""Business Continuity Management""; ""Compliance""; ""Reputational Risk""; ""Managing Reputational Risk""; ""3 Risk Analysis""
  • ""Introduction""""Physical Security Risk Assessments""; ""Risk Assessment Method""; ""Benefits of Security Assessments""; ""Executive Management Role in Risk Analysis""; ""4 Threat Identification and Rating""; ""Introduction""; ""All-Hazards Approach versus Design-Basis Threat""; ""All-Hazards Approach""; ""Design-Basis Threat""; ""Identifying Threats""; ""Information Gathering""; ""Jurisdictional Threat""; ""Identifying Hazards""; ""Natural Hazards""; ""Man-Made Hazards""; ""5 Risk Identification""; ""Introduction""; ""Assets""; ""Exposure""; ""Losses""
  • ""6 National Infrastructure Protection Plan and Critical Infrastructure and Key Resources""""Asset Identification and Prioritization""; ""National Infrastructure Protection Plan""; ""Reference""; ""7 Vulnerability Assessment""; ""Introduction""; ""Assessing Your Vulnerabilities""; ""Level of Visibility""; ""Criticality of Target Site to Jurisdiction""; ""Impact Outside of the Jurisdiction""; ""Potential Threat Element Access to the Target (Accessibility)""; ""Potential Target Threat of Hazard""; ""Potential Target Site Population""; ""Potential for Collateral Mass Casualties""
  • ""8 Vulnerabilities""""Physical Security Systems""; ""Physical Threat Monitoring""; ""Technology and Physical Security Blended: A Layered Approach""; ""The Physical Threat""; ""Theft (Physical and Virtual)""; ""Sabotage""; ""Human Error""; ""Environmental Disruption""; ""Employee Background Checks""; ""Use of Security Officers""; ""Emergency Action Plans""; ""Evacuation Procedures, Escape Routes, and Floor Plans""; ""Emergencies Outside of the Building""; ""Emergencies Within the Building""; ""Health Emergencies""; ""Reporting and Alerting Authorities""
  • ""Alerting Staff and Visitors of an Emergency""