Skip to content

Security Risk Assessment and Management A Professional Practice Guide for Protecting Buildings and Infrastructures

Best in textbook rentals since 2012!

ISBN-10: 0471793523

ISBN-13: 9780471793526

Edition: 2007

Authors: Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor

List price: $119.95
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!

Rental notice: supplementary materials (access codes, CDs, etc.) are not guaranteed with rental orders.

what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Proven set of best practices for security risk assessment and management, explained in plain English This guidebook sets forth a systematic, proven set of best practices for security risk assessment and management of buildings and their supporting infrastructures. These practices are all designed to optimize the security of workplace environments for occupants and to protect the interests of owners and other stakeholders. The methods set forth by the authors stem from their research at Sandia National Laboratories and their practical experience working with both government and private facilities. Following the authors' step-by-step methodology for performing a complete risk assessment, you…    
Customers also bought

Book details

List price: $119.95
Copyright year: 2007
Publisher: John Wiley & Sons, Incorporated
Publication date: 3/12/2007
Binding: Hardcover
Pages: 384
Size: 6.45" wide x 9.55" long x 1.08" tall
Weight: 1.474
Language: English

Security Risk Assessment and Management Process
Introduction
Security Risk Equation
Security Risk Assessment and Management Process
Facility Characterization
Threat Analysis
Consequence Analysis
System Effectiveness Assessment
Risk Estimation
Comparison of Estimated Risk Levels
Risk Reduction Strategies
Presentation to Management
Risk Management Decisions
Information Protection
Process Summary
References
Exercises
Screening Analysis
Introduction
Screening Analysis Methods
Summary
References
Exercises
Facility Characterization
Introduction
Undesired Events
Facility Description
Physical Details
Cyber Information System
Facility Operations
Security Protection Systems
Workforce Description
Restrictions, Requirements, Limitations
Critical Assets
Generic Fault Tree
Identifying Critical Assets
Protection Objectives
Summary
References
Exercises
Threat Analysis
Introduction
Sources of Threat Information
Local and State Sources
National Sources
Adversary Spectrum
Adversary Capability
Threat Potential for Attack
Outsider Threat
Insider Threat
Summary
References
Exercises
Consequence Analysis
Introduction
Reference Table of Consequences
Consequence Values for Undesired Events
Summary
References
Exercises
Asset Prioritization
Introduction
Prioritization Matrix
Summary
References
Exercises
System Effectiveness
Introduction
Protection System Effectiveness
Adversary Strategies
Physical Protection System Effectiveness
Cyber Protection System Effectiveness
Summary
References
Exercises
Estimating Security Risk
Introduction
Estimating Security Risk
Conditional Risk
Relative Risk
Summary
References
Exercises
Risk Reduction Strategies
Introduction
Strategies for Reducing Likelihood of Attack
Strategies for Increasing Protection System Effectiveness
Physical Protection System Upgrades
Cyber Protection System Upgrades
Protection System Upgrade Package(s)
Strategies for Mitigating Consequences
Construction Hardening
Redundancy
Optimized Recovery Strategies
Emergency Planning
Combinations of Reduction Strategies
Summary
References
Exercises
Evaluating Impacts
Risk Level
Costs
Operations/Schedules
Public Opinion
Other Site-Specific Concerns
Review Threat Analysis
Summary
References
Exercises
Risk Management Decisions
Introduction
Risk Assessment Results
Executive Summary
Introduction
Threat Analysis
Consequence Analysis
System Effectiveness Assessment
Risk Estimation
Risk Reduction Strategies and Packages
Impact Analysis
Supporting Documentation
Report Overview
Ri