
Strategic Security Management : A Risk Assessment Guide for Decision Makers.
Title:
Strategic Security Management : A Risk Assessment Guide for Decision Makers.
Author:
Vellani, Karim.
ISBN:
9780080465968
Personal Author:
Physical Description:
1 online resource (413 pages)
Contents:
Front cover -- Title page -- Copyright page -- Table of contents -- About the Author -- Contributing Authors -- Acknowledgments -- Introduction -- Chapter 1: Data-Driven Security -- Data-Driven Security -- Security Metrics -- SMART Metrics -- Data-Driven Assessments -- Chapter 2: Asset Identification and Security Inventory -- Definitions -- Asset Classification -- Identifying Critical Assets -- Target Selection -- Consequence Analysis -- Countermeasure Inventory -- Security Assessments -- Chapter 3: Threat Assessments -- Threat Formula -- Threat Identification and Classification -- Threat Information Sources -- Assessing Threats -- Emerging Threats -- Threat Dynamics -- The Homeland Security Advisory System -- Chapter 4: Crime Analysis -- Statistics for Security Management -- Crime Triangle -- Purpose of Crime Analysis -- Data Sources -- Law Enforcement Data versus Social Disorder Models -- Advantages of Law Enforcement Data -- Geographic Levels -- Methodology -- Return on Security Investment (ROSI) -- Chapter 5: Vulnerability Assessments -- Definition -- Vulnerability Assessments -- Scope of Vulnerability Assessments -- The Vulnerability Assessment Team -- Asset-Based and Scenario-Based Vulnerability Assessments -- Vulnerability Assessment Steps -- Vulnerability Rating Scale -- The Security Survey Report -- The Vulnerability Assessment Report -- Chapter 6: Risk Assessments -- Definition -- Risk Assessments -- Qualitative Risk Assessments -- Quantitative Risk Assessments -- Specialized Risk Assessment Methodologies -- Risk Mitigation -- Risk Assessment Report -- Chapter 7: Information Technology Risk Management -- Why Information Technology Security Is Important to Traditional Security Decision Makers -- Information Technology Risk Management -- Asset Identification -- Information Technology Risk Assessment.
Information Technology System Characterization -- Threat Assessment -- Vulnerability Assessment -- Control Evaluation -- Likelihood Determination -- Impact Analysis -- Risk Determination -- Control Recommendations -- Results Documentation -- Risk Mitigation -- Control Implementation Methodology -- Control Categories -- Cost-Benefit Analysis -- Residual Risk -- Evaluation and Refinement -- Chapter 8: Prevention -- The Need and Practical Application of Theoretical Study -- Situational Crime Prevention -- Rational Choice -- Routine Activity -- Crime Prevention Through Environmental Design (CPTED) -- Crime Displacement and Diffusion of Benefits -- Prevention Measures -- Chapter 9: Security Measures: Policies and Procedures -- Security Awareness -- Security Plan -- Emergency Management Plan -- Conclusion -- Chapter 10: Security Measures: Physical Security -- Introduction -- Types of Physical Security Countermeasures -- Integration of Multiple Physical Security Countermeasures -- Integration of Physical Security Countermeasures with Personnel and Policies and Procedures Countermeasures -- Determining Physical Security Countermeasure Needs -- Matching Product to Need -- Defining Cost and Cost-Benefit Analysis -- Cost-Benefit Analysis -- Best Practices -- Codes and Ordinances -- Summary -- Chapter 11: Security Measures: Deploying Physical Security -- Countermeasure Selection -- Creating Management Buy-In -- Countermeasure Implementation -- Auditing Effectiveness -- Chapter 12: Security Measures: Personnel -- Introduction -- Training -- Metric-Based Security Deployment -- Off-Duty Law Enforcement Officers versus Security Officers -- Contract Security Forces versus Proprietary Security Forces -- Quality Control and Performance Evaluation -- The Soapbox: Increasing Professionalism -- Chapter 13: Project Management -- The Security Project Manager.
The Security Project Team -- Security Project Management Success: Subjective and Objective Criteria -- Financial and Resource Management -- Return on Security Investment -- Chapter 14: Premises Security Liability -- Premises Security Law -- Plaintiff's Theories -- Security Officer Misconduct -- Negligent Hiring Liability -- Reducing the Risk of Liability-Evaluating the Security Program -- Crime Risk Analysis-An Initial Step -- The Role of Statutes, Ordinances, and Regulations -- National Security Standards -- "Standards" versus "Guidelines" -- The Rationale for National Standards -- Security Risk Assessments -- Conclusion -- Chapter 15: Forensic Security -- Premises Liability Matters -- Tortious Conduct -- Qualifications for Forensic Security Consulting -- Strategies to Market One's Forensic Practice -- The Retention Process -- Assessing the File -- The Consultant Forms a Supportive Opinion -- Security Premises Liability Forensic Consulting -- The Defense Expert's Opinions -- Chapter 16: Ethics in Security Consulting -- Introduction -- Ethics in Practice -- Walk-Away Value -- Advocate versus Educator -- Rules to Live by: -- Forensic Consulting/Easy Conflicts -- Conclusion -- Appendix A: Certified Security ConsultantSM Code of Ethics -- Appendix B: Best Practice #2, Forensic Methodology of the International Association of Professional Security Consultants -- Appendix C: Risk Assessment Report -- Appendix D: Crime Analysis Report -- Bibliography -- Recommended Reading -- Index.
Abstract:
Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organization's assets, giving decision makers the foundation needed to climb the next step up the corporate ladder. Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald. * Provides clear direction on how to meet new business demands on the security professional * Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program * Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Genre:
Electronic Access:
Click to View