Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by Pieter C. Arlow, David L. Russell
Industrial Security: Managing Security in the 21st Century
Cover
Title page
Chapter 1: Introduction to Security Risk Assessment and Management
Introduction
Business Definition
Security Versus Risk
Framework for Risk Management
Value at Risk
Calculation of Risk
Risk Assessment Versus Risk Management
Risk Management Plans
Threat Scenarios
Statistics and Mathematics
Pairing Vulnerability and Threat Data
Setting Priorities
Other Definitions of Risk Assessment
Business Definition for Risk Assessment
Broad Definition for Risk Assessment
Quantitative Risk Assessment
Qualitative Risk Assessment
Countermeasures for Vulnerabilities
Sample Threat Scenario NO. 1 (Fig. 1.6)
Sample Threat Scenario No. 2
Chapter 2: Risk Assessment Basics
Street Calculus and Perceived Risk
Security Risk Assessment Structure
Value at Risk
Sandia Laboratory’s Risk Assessment Analysis
Annualized Cost Analysis of Risk
Scenario-driven Cost Risk Analysis
Model-Based Risk Analysis
Risk Management by Fault Tree Methods and Risk-informed Decision management
Chapter 3: Assessing Types of Attacks and Threats with Data Sources
Weapons
Muzzle Energies for Various Cartridges
Rifle Grenades
Rocket-Propelled Grenades and Mortars
Explosive Energies
Other Types of Incidents and Accidents
Chapter 4: Evaluating a Company’s Protective Systems
Surveys and Assessments
Site Security Assessments
Lighting
Perimeter Barriers: Design Notes and Comments
CCTV
Windows and Doors
Chapter 5: Port Security
Ranking Threats
Levels of Port Security
Identification Procedures for Personnel Screening
Vessel Arrival and Security Procedures While Moored
Internal Security
Perimeter Security and Restricted Areas
Lighting
Security Alarms/Video Surveillance/Communications Systems
Training and Security Awareness
Floating Barriers
Chapter 6: Basics of Cyber security
Communications Life Cycle
Some Solutions to the Problem of Cyber crime
Communications Security
Communications as Transactions
Telephone System Security
Radio Communications
Digital Communications
Cyber security
How to Perform the Vulnerability Assessment
Communications Procedure Design: Hints and Helps
Benefits: Identified
Cyber Threat Matrix: Categories of Loss and Frequency
Setting up Internet Security
Cyber security Tools
Chapter 7: Scenario Planning and Analyses
Introduction
FTA, Markov Chains, and Monte Carlo Methods
Other Complimentary Techniques
Sample of Initial Analysis
Failure Modes and Effects Analysis
DHS Analysis and Plans
Bow-tie Analysis
HAZOPS and Process Safety Management
ALOHA, CAMEO, and Security Planning Tools
The Colored Books
Chapter 8: Security System Design and Implementation: Practical Notes
Security Threat-Level Factors
Considered Factors
Security System Design
Electronic Security Systems Design
Review and Assessment of Engineering Design and Implementation
Conclusion
Appendix I: Physical Security Checklist
Building
Lock and key, alarm systems, and guards
Employee security
Trash removal and shipments from the facility
Planning
Mail handling
Fire plans
Appendix II
Cyber Security Threat/Vulnerability Assessment
Cyber Security Threat/Vulnerability Assessment Scoring
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset