Book description
Security and risk management are principally concerned with the protection and conservation of corporate assets and resources. The task of protection continues to be an increasingly complex one in a time when technology is creating new products (and thus risk) at an explosive rate. Add this to the crime rate -- now aggravated by domestic and international terrorism -- and the importance of risk analysis and evaluation to design proper protection becomes self-evident.With an awareness of the growing threat of global terrorism, the third edition of RISK ANALYSIS AND THE SECURITY SURVEY has been completely updated. It includes two new chapters covering disaster recover planning, mitigation, and the evolving methodologies that are a result of the Homeland Security Act. The following topics will also be added and covered among the various chapters: contingency planning, testing of disaster response plan, managing during a crisis, maintaining and testing a response plan (team drills, etc.), bomb threats and suicide bombings, and prevention techniques to better prepare business for new post 9/11 security risks.
- Covers Business Impact Analysis (BIA), Project Planning, Data Collection, Data Analysis and Report of Findings, and Prediction of Criminal Behavior
- Presents updated statistical information and practical case examples
- Helps professionals and students produce more effective results-oriented security surveys
Table of contents
- Front Cover
- Title Page
- Copyright Page
- Table of Contents
- Acknowledgments
- Introduction (1/2)
- Introduction (2/2)
-
PART I The Treatment and Analysis of Risk
- 1 Risk (1/2)
- 1 Risk (2/2)
- 2 Vulnerability and Threat Identification (1/3)
- 2 Vulnerability and Threat Identification (2/3)
- 2 Vulnerability and Threat Identification (3/3)
- 3 Risk Measurement (1/2)
- 3 Risk Measurement (2/2)
- 4 Quantifying and Prioritizing Loss Potential
- 5 Cost/Benefit Analysis (1/2)
- 5 Cost/Benefit Analysis (2/2)
- 6 Other Risk Analysis Methodologies (1/2)
- 6 Other Risk Analysis Methodologies (2/2)
- 7 The Security Survey: An Overview (1/2)
- 7 The Security Survey: An Overview (2/2)
- 8 Management Audit Techniques and the Preliminary Survey (1/3)
- 8 Management Audit Techniques and the Preliminary Survey (2/3)
- 8 Management Audit Techniques and the Preliminary Survey (3/3)
- 9 The Survey Report (1/2)
- 9 The Survey Report (2/2)
- 10 Crime Prediction (1/3)
- 10 Crime Prediction (2/3)
- 10 Crime Prediction (3/3)
- 11 Determining Insurance Requirements (1/2)
- 11 Determining Insurance Requirements (2/2)
-
PART II Emergency Management and Business Continuity Planning
- 12 Mitigation and Preparedness (1/5)
- 12 Mitigation and Preparedness (2/5)
- 12 Mitigation and Preparedness (3/5)
- 12 Mitigation and Preparedness (4/5)
- 12 Mitigation and Preparedness (5/5)
- 13 Response Planning (1/12)
- 13 Response Planning (2/12)
- 13 Response Planning (3/12)
- 13 Response Planning (4/12)
- 13 Response Planning (5/12)
- 13 Response Planning (6/12)
- 13 Response Planning (7/12)
- 13 Response Planning (8/12)
- 13 Response Planning (9/12)
- 13 Response Planning (10/12)
- 13 Response Planning (11/12)
- 13 Response Planning (12/12)
- 14 Business Continuity Planning (1/4)
- 14 Business Continuity Planning (2/4)
- 14 Business Continuity Planning (3/4)
- 14 Business Continuity Planning (4/4)
- 15 Business Impact Analysis (1/5)
- 15 Business Impact Analysis (2/5)
- 15 Business Impact Analysis (3/5)
- 15 Business Impact Analysis (4/5)
- 15 Business Impact Analysis (5/5)
- 16 Plan Documentation (1/2)
- 16 Plan Documentation (2/2)
- 17 Crisis Management Planning for Kidnap, Ransom, and Extortion (1/3)
- 17 Crisis Management Planning for Kidnap, Ransom, and Extortion (2/3)
- 17 Crisis Management Planning for Kidnap, Ransom, and Extortion (3/3)
- 18 Monitoring Safeguards (1/2)
- 18 Monitoring Safeguards (2/2)
- 19 The Security Consultant (1/2)
- 19 The Security Consultant (2/2)
-
Appendices
- APPENDIX A Security Survey Work Sheets (1/4)
- APPENDIX A Security Survey Work Sheets (2/4)
- APPENDIX A Security Survey Work Sheets (3/4)
- APPENDIX A Security Survey Work Sheets (4/4)
- APPENDIX B Danger Signs of Fraud, Embezzlement, and Employee Theft (1/2)
- APPENDIX B Danger Signs of Fraud, Embezzlement, and Employee Theft (2/2)
- APPENDIX C Professional Practices for Business Continuity Planners (1/6)
- APPENDIX C Professional Practices for Business Continuity Planners (2/6)
- APPENDIX C Professional Practices for Business Continuity Planners (3/6)
- APPENDIX C Professional Practices for Business Continuity Planners (4/6)
- APPENDIX C Professional Practices for Business Continuity Planners (5/6)
- APPENDIX C Professional Practices for Business Continuity Planners (6/6)
- APPENDIX D Sample Business Impact Analysis Introduction Letter
- APPENDIX E Sample Kidnap and Ransom Contingency Plan (1/3)
- APPENDIX E Sample Kidnap and Ransom Contingency Plan (2/3)
- APPENDIX E Sample Kidnap and Ransom Contingency Plan (3/3)
- APPENDIX F How to Establish Notice (1/2)
- APPENDIX F How to Establish Notice (2/2)
- APPENDIX G Communicating with the Media
- APPENDIX H Security Systems Specifications (1/2)
- APPENDIX H Security Systems Specifications (2/2)
- APPENDIX I Sample Introduction Memorandum: Disaster Recovery Planning
- Index (1/5)
- Index (2/5)
- Index (3/5)
- Index (4/5)
- Index (5/5)
Product information
- Title: Risk Analysis and the Security Survey, 3rd Edition
- Author(s):
- Release date: February 2006
- Publisher(s): Butterworth-Heinemann
- ISBN: 9780750679220
You might also like
book
Mastering Operational Risk, 2nd Edition
A practical guide, from the basic techniques, through to advanced applications, showing you what operational risk …
book
Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning
Combatting Cyber Terrorism – A guide to understanding the cyber threat landscape and incident response planning …
book
Risk Assessment: Theory, Methods, and Applications
An introduction to risk assessment that utilizes key theory and state-of-the-art applications With its balanced coverage …
book
Corporate Governance: Principles, Polices and Practices
The second edition of A. C. Fernando's bestselling Corporate Governance: Principles, Policies and Practices sheds light …