Threat assessment and risk analysis an applied approach
Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book explores physical vulnerabilit...
Other Authors: | , |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Oxford, England ; Waltham, Massachusetts :
Butterworth Heinemann
2016.
|
Edition: | 1st edition |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629599106719 |
Table of Contents:
- ""Front Cover""; ""Threat Assessment and Risk Analysis""; ""Copyright Page""; ""Contents""; ""1 Introduction to the Department of Homeland Security""; ""Introduction""; ""Homeland Security Platform""; ""Risk Analysis and Management for Critical Asset Protection""; ""Asset Characterization and Screening""; ""Threat Characterization""; ""Consequence Analysis""; ""Vulnerability Analysis""; ""Threat Assessment""; ""Risk Assessment""; ""Homeland Security Act of 2002""; ""Homeland Security Presidential Directives""; ""2 What is Risk?""; ""Introduction""; ""Understanding Physical Security Risk""
- ""Risk Management""""Operational Risk""; ""Legal Risk (Information Security)""; ""ISO 17799 and BS 7799: The Key Components of the Standard""; ""Information Security Policy for the Organization""; ""Creation of Information Security Infrastructure""; ""Asset Classification and Control""; ""Personnel Security""; ""Physical and Environmental Security""; ""Communications and Operations Management""; ""Access Control""; ""System Development and Maintenance""; ""Business Continuity Management""; ""Compliance""; ""Reputational Risk""; ""Managing Reputational Risk""; ""3 Risk Analysis""
- ""Introduction""""Physical Security Risk Assessments""; ""Risk Assessment Method""; ""Benefits of Security Assessments""; ""Executive Management Role in Risk Analysis""; ""4 Threat Identification and Rating""; ""Introduction""; ""All-Hazards Approach versus Design-Basis Threat""; ""All-Hazards Approach""; ""Design-Basis Threat""; ""Identifying Threats""; ""Information Gathering""; ""Jurisdictional Threat""; ""Identifying Hazards""; ""Natural Hazards""; ""Man-Made Hazards""; ""5 Risk Identification""; ""Introduction""; ""Assets""; ""Exposure""; ""Losses""
- ""6 National Infrastructure Protection Plan and Critical Infrastructure and Key Resources""""Asset Identification and Prioritization""; ""National Infrastructure Protection Plan""; ""Reference""; ""7 Vulnerability Assessment""; ""Introduction""; ""Assessing Your Vulnerabilities""; ""Level of Visibility""; ""Criticality of Target Site to Jurisdiction""; ""Impact Outside of the Jurisdiction""; ""Potential Threat Element Access to the Target (Accessibility)""; ""Potential Target Threat of Hazard""; ""Potential Target Site Population""; ""Potential for Collateral Mass Casualties""
- ""8 Vulnerabilities""""Physical Security Systems""; ""Physical Threat Monitoring""; ""Technology and Physical Security Blended: A Layered Approach""; ""The Physical Threat""; ""Theft (Physical and Virtual)""; ""Sabotage""; ""Human Error""; ""Environmental Disruption""; ""Employee Background Checks""; ""Use of Security Officers""; ""Emergency Action Plans""; ""Evacuation Procedures, Escape Routes, and Floor Plans""; ""Emergencies Outside of the Building""; ""Emergencies Within the Building""; ""Health Emergencies""; ""Reporting and Alerting Authorities""
- ""Alerting Staff and Visitors of an Emergency""