Book description
A comprehensive and practical guide to security organization and planning in industrial plants
Features Basic definitions related to plant security
Features Countermeasures and response methods
Features Facilities and equipment, and security organization
Topics covered are applicable to multiple types of industrial plants
Illustrates practical techniques for assessing and evaluating financial and corporate risks
Table of contents
- Cover
- Title page
-
Chapter 1: Introduction to Security Risk Assessment and Management
- Introduction
- Business Definition
- Security Versus Risk
- Framework for Risk Management
- Value at Risk
- Calculation of Risk
- Risk Assessment Versus Risk Management
- Risk Management Plans
- Threat Scenarios
- Statistics and Mathematics
- Pairing Vulnerability and Threat Data
- Setting Priorities
- Other Definitions of Risk Assessment
- Business Definition for Risk Assessment
- Broad Definition for Risk Assessment
- Quantitative Risk Assessment
- Qualitative Risk Assessment
- Countermeasures for Vulnerabilities
- Sample Threat Scenario NO. 1 (Fig. 1.6)
- Sample Threat Scenario No. 2
- Chapter 2: Risk Assessment Basics
- Chapter 3: Assessing Types of Attacks and Threats with Data Sources
- Chapter 4: Evaluating a Company’s Protective Systems
-
Chapter 5: Port Security
- Ranking Threats
- Levels of Port Security
- Identification Procedures for Personnel Screening
- Vessel Arrival and Security Procedures While Moored
- Internal Security
- Perimeter Security and Restricted Areas
- Lighting
- Security Alarms/Video Surveillance/Communications Systems
- Training and Security Awareness
- Floating Barriers
-
Chapter 6: Basics of Cyber security
- Communications Life Cycle
- Some Solutions to the Problem of Cyber crime
- Communications Security
- Communications as Transactions
- Telephone System Security
- Radio Communications
- Digital Communications
- Cyber security
- How to Perform the Vulnerability Assessment
- Communications Procedure Design: Hints and Helps
- Benefits: Identified
- Cyber Threat Matrix: Categories of Loss and Frequency
- Setting up Internet Security
- Cyber security Tools
- Chapter 7: Scenario Planning and Analyses
- Chapter 8: Security System Design and Implementation: Practical Notes
- Appendix I: Physical Security Checklist
- Appendix II
- Index
- End User License Agreement
Product information
- Title: Industrial Security: Managing Security in the 21st Century
- Author(s):
- Release date: April 2015
- Publisher(s): Wiley
- ISBN: 9781118194638
You might also like
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Physical Security and Safety
How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner …
book
Pentesting Industrial Control Systems
Discover modern tactics, techniques, and procedures for pentesting industrial control systems Key Features Become well-versed with …
book
Thinking Security: Stopping Next Year’s Hackers
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV …