Vulnerability Assessment of Physical Protection Systems

ISBN-10: 0750677880
ISBN-13: 9780750677882
Edition: 2006
Authors: Mary Lynn Garcia
Buy it from $72.75
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the  More...

New Starting from $72.90
eBooks Starting from $66.95
Buy
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
History of Western Art Online content $4.95 $1.99
Add to cart
Study Briefs
History of World Philosophies Online content $4.95 $1.99
Add to cart
Study Briefs
American History Volume 1 Online content $4.95 $1.99
Add to cart
Study Briefs
History of Western Music Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

Copyright year: 2006
Publisher: Elsevier Science & Technology Books
Publication date: 10/28/2005
Binding: Paperback
Pages: 400
Size: 6.75" wide x 9.75" long x 0.75" tall
Weight: 1.496
Language: English

Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer, project management and planning of the VA, team membership, step-by-step details for performing the VA, data collection and analysis, important notes on how to use the VA to suggest design improvements and generate multiple design options. The text will end with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools will be introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact. -A practical, scientific approach to the topic of physical security -Step-by-step details for performing the Vulnerability Assessment Over 150 figures and tables to illustrate complex concepts.

Ms. Garcia is a Senior Member of the Technical Staff at Sandia National Labs. She has over 20 years experience in Science and Engineering research, development, application, teaching, and project management experience of security systems and technology. She has been a certified Protection Professional since 1997.

Preface
Introduction to Vulnerability Assessment
Risk Management and Vulnerability Assessment
Risk Assessment and the Vulnerability Assessment Process
Statistics and Quantitative Analysis
Vulnerability Assessment Process Overview
Planning the Vulnerability Assessment
Project Management
Establish the Vulnerability Assessment Team
Project Kick-Off Meetings
Protection Objectives
Facility Characterization
Data Collection-Detection
Intrusion Sensors
Alarm Assessment
Entry Control
Alarm Communication and Display
Data Collection-Delay
Data Collection-Response
Analysis
Reporting and Using the Vulnerability Assessment
Systems Engineering and Vulnerability Assessment
System Requirements
System Design and Analysis
System Installation and Test
System Replacement
Summary
References
Physical Protection Systems Principles and Concepts
Physical Protection Systems Overview
Physical Protection System Design
PPS Functions
Detection
Delay
Response
Relationship of PPS Functions
Characteristics of an Effective PPS
Protection-in-Depth
Minimum Consequence of Component Failure
Balanced Protection
Design and Evaluation Criteria
Additional Design Elements
Summary
Reference
Getting Started
Project Management
Phase One-Project Planning
Initial Customer Contact
Define the Project
Phase Two-Managing the Project
Project Status and Reporting
Recovery Plans
Project Management Tools
Project Closeout
Project Management Summary
Establish a Vulnerability Assessment Team
Vulnerability Assessment Project Leader
Systems Engineer
Security System Engineer
SME-Intrusion Sensing Subsystem
SME-Alarm Assessment Subsystem
SME-Alarm Communication & Display (AC&D) Subsystem
SME-Entry Control Subsystem
SME-Delay Subsystem
SME-Response Subsystem
SME-Communications Subsystem
SME-Analyst
Special Note for Response Force Simulations
Participation of On-Site Personnel
Kick-Off Meetings for Project Team and Customer
Project Team Kick-Off Meeting
VA Team Guide
Site Information
Customer Kick-Off Meeting
Summary
References
VA Process Inputs-Establish Protection Objectives
Defining the Threat
Listing Information Needed
Collecting Information
Organizing Information
Threat Definition Methods
Insider Threat
Other Notes on Threat Definition
Estimating Likelihood of Attack
Asset Identification
Asset Identification Methods
Manual Listing
Logic Diagrams
Criteria
Threat/Asset Matrix
Facility Characterization
Characterization Tools
Facility States
Security Checklists
Summary
References
Data Collection-Intrusion Detection Subsystem
Sensor Overview
Exterior Intrusion Sensor Technologies and Evaluation
Freestanding Sensors
Exterior Microwave Sensors
Electric-field Sensors
Freestanding Sensors Summary
Buried-Line Sensors
Ported Coaxial Sensors
Buried-Line Sensors Summary
Fence-Associated Sensors
Taut Wire Sensors
Fiber Optic Sensors
Fence-Associated Sensors Summary
Other Exterior Intrusion Sensing Technologies
General Exterior Intrusion Sensing Evaluation
Summary of Exterior Intrusion Sensing
Interior Intrusion Sensor Technologies and Evaluation
Boundary Penetration Sensors
Magnetic Switches
Glass-Break Sensors
Boundary Penetration Sensors Summary
Volumetric Sensing Technologies
Microwave Sensors
Passive Infrared Sensors
Video Motion Detection Sensors
Volumetric Sensors Summary
Proximity Sensing Technologies
Pressure Sensors
Proximity Sensors Summary
Other Technologies
General Interior Intrusion Sensing Evaluation
Summary of Interior Sensing Technologies
Intrusion Sensing by Humans
Estimating Intrusion Sensing Performance
Summary
Reference
Data Collection-Alarm Assessment Subsystem
Alarm Assessment Overview
Assessment versus Surveillance
Video Assessment Performance Factors
Evaluation Testing
Video Assessment Subsystem
Video Subsystem Equipment
Cameras and Lenses
Camera Housings
Camera Mounting
Lighting
Signal Transmission
Video Recording and Storage
Monitors
Other Equipment
Procedures
Estimating Performance
Summary
References
Data Collection-Entry Control Subsystem
Entry Control Subsystem Overview
Personnel Control
Tokens
Coded Credentials
Private Information
Badge Control Equipment Components and Functions
Biometrics
Locks
Material Control
Personnel Metal Detection
Trace Detection Systems
Package Material Control
Evaluation Criteria for Contraband Detection
Asset Tracking
Vehicle Control
Subsystem Integration Issues
Entry Control Subsystem Components
General Evaluation Criteria
Access Controls
Operator Training
Estimating Performance
Summary
Reference
Data Collection-Alarm Communication and Display Subsystem
Alarm Communication and Display Overview
Communication
High-Level Communications
Low-Level Communications
Information Handling
Control and Display
Offline Systems
Evaluation Techniques
Operator Workload
Displays
Video System Integration
Network Issues
Other Evaluation Aspects
Estimating Performance
Summary
Reference
Data Collection-Delay Subsystem
Delay Overview
Perimeter Barriers
Fences
Gates
Chain-link Gates
Turnstiles
Vehicle Barriers
Buildings
Walls
Floors and Roofs
Doors
Personnel Doors
Attack- and Bullet-Resistant Doors
Vehicle Doors
Vault Doors
Windows, Grilles, and Utility Ports
Windows
Grilles and Utility Ports
Windows, Grilles, and Utility Ports Summary
Other Barriers
Armor
Vaults
Earth and Overburden
Underground Facilities
Airborne-Attack Barriers
Waterborne-Attack Barriers
Tie-downs and Restraints
Nonlethal Weapons
Dispensable Materials and Deployable Barriers
General Delay Subsystem Evaluation Factors
Estimating Performance
Summary
Reference
Data Collection-Response Subsystem
Response Overview
Response Strategies
Deterrence
Denial
Containment
Recovery
Delayed Response
Equipment
Procedures
People
Immediate Response
General Warning Alarms
Observe-and-Report
Dispatch of Unarmed Security Personnel
Dispatch of Armed Security Personnel
Response Communications
Radio Communication System
Radio Maintenance
Operational Issues
Estimating Performance
Summary
References
Analysis
Analysis Overview
Analysis Tools
Analysis Process
Adversary Sequence Diagrams and Path Analysis
Scenario Analysis
Estimate Neutralization
Other Analysis
Calculate System Effectiveness
Upgrade Analysis
Qualitative Analysis
Facility Overview
Path Analysis
Scenario Analysis
Upgrade Analysis
Quantitative Analysis
Facility Description
Path Analysis
Scenario Analysis
Estimate Neutralization
Baseline System Effectiveness
Upgrade Analysis
Summary
Reporting and Using Results
Overview
Reporting Results
Briefings
Report Content and Format
Protecting Results
Reporting Summary
Using the Vulnerability Assessment
Design Stages
Project Closeout
Summary
Project Management forms and Templates
Initial Briefing Template
Threat and Facility Worksheets
Data Collection Sheets
Alarm Communication and Display Subsystem Criteria
Representative Delays
Results Briefing Template
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×