Cover image for Industrial Security : Managing Security in the 21st Century.
Industrial Security : Managing Security in the 21st Century.
Title:
Industrial Security : Managing Security in the 21st Century.
Author:
Russell, David L.
ISBN:
9781119028406
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (221 pages)
Contents:
Title Page -- Copyright Page -- Contents -- Chapter 1 Introduction to Security Risk Assessment and Management -- Introduction -- Business Definition -- Security Versus Risk -- Framework for Risk Management -- Value at Risk -- Calculation of Risk -- Risk Assessment Versus Risk Management -- Risk Management Plans -- Threat Scenarios -- Statistics and Mathematics -- Pairing Vulnerability and Threat Data -- Setting Priorities -- Other Definitions of Risk Assessment -- Business Definition for Risk Assessment -- Broad Definition for Risk Assessment -- Quantitative Risk Assessment -- Qualitative Risk Assessment -- Threats -- Vulnerabilities -- Countermeasures for Vulnerabilities -- The D's of security systems -- Sample Threat Scenario No. 1 -- Background -- Sample Threat Scenario No. 2 -- Background -- Notes -- Chapter 2 Risk Assessment Basics -- Street Calculus and Perceived Risk -- Street Calculus -- Security Risk Assessment Structure -- Value at Risk -- Sandia Laboratory's Risk Assessment Analysis -- Annualized Cost Analysis of Risk -- Scenario-driven Cost Risk Analysis -- Real-world example -- Model-Based Risk Analysis -- MBRA example case -- Risk Management by Fault Tree Methods and Risk-informed Decision Management -- Fault tree analysis -- RIDM -- Notes -- Chapter 3 Assessing Types of Attacks and Threats with Data Sources -- Weapons -- AK-47 -- M16 -- Sniper rifles -- Muzzle Energies for Various Cartridges -- Rifle Grenades -- Rocket-Propelled Grenades and Mortars -- Explosive Energies -- Impact of explosives -- Other Types of Incidents and Accidents -- Notes -- Chapter 4 Evaluating a Company's Protective Systems -- Surveys and Assessments -- Site Security Assessments -- Checklists -- Cyber security checklist -- Lighting -- Perimeter Barriers: Design Notes and Comments -- CCTV -- Windows and Doors -- Notes -- Chapter 5 Port Security.

Ranking Threats -- Natural threats -- Man-made/accidental threats -- Intentional acts-delivery vectors -- Weapon threats -- Levels of Port Security -- Security response plans -- Recommended procedures -- Identification Procedures for Personnel Screening -- Employees -- Vendors/contractors/vessel pilots -- Truck drivers/passengers -- Visitors (all personnel not falling into other categories) -- Government employees -- Vessel personnel access through a facility -- Search requirements -- Acceptable identification -- Access control -- Vessel Arrival and Security Procedures While Moored -- Internal Security -- Vehicle control -- Rail security -- Key/ID/access card control -- Computer security -- Security rounds -- Perimeter Security and Restricted Areas -- Barriers -- Fencing -- Lighting -- Security Alarms/Video Surveillance/Communications Systems -- Alarms -- Video surveillance -- Communications systems -- Training and Security Awareness -- Floating Barriers -- Notes -- Chapter 6 Basics of Cyber security -- Communications Life Cycle -- Some Solutions to the Problem of Cyber crime -- General recommendations -- Communications Security -- Communications as Transactions -- Telephone System Security -- Radio Communications -- Digital Communications -- Cyber security -- Vulnerability assessment -- Unknowns and alternatives -- How to Perform the Vulnerability Assessment -- Critical success factors -- Optimum assessment team size -- Communications Procedure Design: Hints and Helps -- Benefits: Identified -- Example -- Cyber Threat Matrix: Categories of Loss and Frequency -- Setting up Internet Security -- External versus internal testing -- Security focus -- Browser and domain security -- Data encryption -- Cyber security Tools -- Notes -- Chapter 7 Scenario Planning and Analyses -- Introduction -- FTA, Markov Chains, and Monte Carlo Methods -- Fuzzy fault trees.

Markov chains and Bayesian analysis -- Other Complimentary Techniques -- Fishbone (Ishikawa) diagrams -- Pareto charts -- Sample of Initial Analysis -- Failure Modes and Effects Analysis -- DHS Analysis and Plans -- Bow-Tie Analysis -- Example -- Hazops and Process Safety Management -- Process safety information: General -- PHA and HAZOPS -- ALOHA, CAMEO, and Security Planning Tools -- The Colored Books -- Generic Guideline for the Calculation of Risk Inherent in the Carriage of Dangerous Goods by Rail -- The Orange Book: Management of Risk-Principles and Concepts -- The Green Book: Methods for the Determination of Possible Damage to People and Objects Resulting from Release of Hazardous Materials, CPR-16E -- The Yellow Book: Methods for the Calculation of Physical Effects due to the Releases of Hazardous Materials (Liquids and Gases), CPR-14E -- The Red Book: Methods for Determining and Processing Probabilities, CPR-12 -- The Purple Book: Guidelines for Quantitative Risk Assessment, PGS 3 -- Sample outline for emergency response -- Notes -- Chapter 8 Security System Design and Implementation: Practical Notes -- Security Threat-Level Factors -- Considered Factors -- Vehicle bombs -- Standoff weapons -- Minimum standoff distances -- Security System Design -- Perimeter barriers -- Active vehicle barriers -- Entry roadways -- Entry control stations -- Reinforcement of buildings and infrastructure -- Windows -- Security system lighting -- Lighting system design -- Electronic Security Systems Design -- Alarm configurations and design -- Access control -- Employee screening -- Visitor identification and control -- Packages, personnel, and vehicle control -- Lock and key systems -- Security forces -- Cargo security -- Port security systems -- Review and Assessment of Engineering Design and Implementation -- Auditing and evaluation -- Risk assessment team.

Blank sheet approach to auditing and evaluation -- Business approach to auditing and evaluation -- Benchmarking -- How to evaluate a physical security system? -- Security systems audits -- What to review? -- Implementation of risk assessment -- SQUARE: Prioritizing security requirements -- Security monitoring and enforcement -- Security awareness program -- Proposed future training requirements -- Security management -- The differing roles of the security department -- Stress management techniques -- Security management techniques -- Conclusion -- Notes -- Appendix I Physical Security Checklist -- Building -- Lock and key, alarm systems, and guards -- Employee security -- Trash removal and shipments from the facility -- Planning -- Mail handling -- Fire plans -- Appendix II -- Cyber Security Threat/Vulnerability Assessment -- Impact scale likelihood scale -- Score risk level risk occurrence result -- Cyber Security Threat/Vulnerability Assessment Scoring -- Next steps -- Index -- EULA.
Abstract:
Provides a comprehensive and practical guide to security organization and planning in industrial plants A primer on industrial security written from a slightly different viewpoint. Industrial Security: Managing Security in the 21st Century focuses on analysis of threats, gives practical examples and guides to security standards and guides, and points the way to improving the overall issue of security. It deals with issues of planning, response, and strategies to implement and improve physical security in manufacturing and chemical facilities, and it can be used as a textbook for teaching the subject of industrial security. Based upon research and lectures on security topics which were presented in the Middle East to supervisors of an oil company guard force. The book covers planning and the risks of setting up a security operation, as well as how to balance the need for upgrades against potential losses. Other topics such as fire and hazmat, two issues which are not usually discussed in security books, are covered. Industrial Security features: Basic definitions related to plant security Countermeasures and response methods Facilities and equipment, and security organization While other texts cover the mechanics of managing and running a guard force, no other current book deals with the foundation and planning behind security operation. The wide range of topics featured in this book can be applied to a multitude of industrial plants. David L Russell, PE is an Environmental Engineer with a background in consulting and in the Chemical Industry. He has over 40 years of experience including 9 years in the chemical industry for Hooker, IMC Chemical and Allied Chemicals. He was an instructor for the American Institute of Chemical Engineers where he taught courses in Practical Wastewater Treatment and Hazardous Materials and Hazardous Wastes.

Russell has lectured on security topics to the NATO Advanced Scientific Institute, and has lectured on the responses to terrorism for the Dubai Water and Power Utility, Dubai, UAE, and Saudi Aramco's Security Force and the General Industries Petroleum Company, Bahrain, Security Force. Lieutenant Colonel Pieter Arlow is a Senior Officer within the South African National Defense Force (SANDF), and has over 30 years of experience. He is also an instructor and Senior Security Officer, and has organized and managed many security projects. As an Officer of the SANDF, Lt.Col. Arlow has expertise in risk analysis management, risk assessment, military operations management, intelligence and counter-intelligence, terrorism and counter insurgency, force employment and operations and security management. Additionally he had been appointed as the Joint Commander for national events such as the Commonwealth Heads of Government Meetings and the World Economic Forums and has organized security for events such as the 2010 FIFA World Cup.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: