John M. White, a recognized expert in asset protection management, has over 38 years of experience including military, law enforcement, corporate security administration, and professional security consultation. White is Board Certified in Security Management as a Certified Protection Professional (CPP), and he is a Certified Healthcare Protection Administrator (CHPA), the two highest certifications in the security profession. He is also a member of the International Association of Chiefs of Police, National Association of Chiefs of Police, The International Association for Professional Security Consultants, ASIS International, International Association for Healthcare Security & Safety, and several other professional groups. He has also presented as a security expert at an international security conference.White has been published in the Journal of Healthcare Protection Management, International Association for Healthcare Safety & Security, Rusting Publications, on numerous occasions, and in the association's monthly Directions magazine. He has also been published in the ASIS International's Security Management magazine.
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessment is a fact-finding process that determines an organization's state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it's used, or how to evaluate what they have found. Security Risk Assessment offers security professionals step-by-step guidance for conducting a complete risk assessment. It provides a template draw from, giving security professionals the tools needed to conduct an assessment using the most current approaches, theories, and best practices. - Discusses practical and proven techniques for effectively conducting security assessments- Includes interview guides, checklists, and sample reports- Accessibly written for security professionals with different levels of experience conducting security assessments
Front Cover 1
Security Risk
4
Copyright 5
Contents 6
Acknowledgments 10
About the Author 12
Preface 14
Chapter 1 - Introduction to Security Risk Assessments 18
WHAT IS A SECURITY RISK ASSESSMENT? 18
SECURITY RISK ASSESSMENT INTENT 22
WHO WILL CONDUCT THE ASSESSMENT? 23
HOW OFTEN DO I NEED TO COMPLETE AN ASSESSMENT? 28
HOW LONG WILL THIS PROCESS TAKE? 29
Chapter 2 - Preassessment Planning 32
SERVICES AGREEMENT 32
PROJECT MANAGEMENT 34
IDENTIFY THE PARTICIPANTS 36
PROJECT SCHEDULE 39
BUDGETING CONSIDERATIONS 42
PROJECT ASSUMPTIONS 44
DELIVERABLES 45
Chapter 3 - Project Management 48
SECURITY MANAGEMENT VERSUS SECURITY CONSULTANT 48
INTERNAL PERSONNEL 49
SECURITY CONSULTANTS 51
Chapter 4 - Defining the Project Scope 56
THE PROJECT SCOPE 56
MEASUREMENT STANDARDS 60
LOCATIONS INCLUDED 63
Chapter 5 - Information Gathering 66
INTERNAL SOURCES 66
EXTERNAL SOURCES 70
STAFF SURVEY 75
PROJECT INTERVIEWS 77
Chapter 6 - Physical Security Assessment 80
KICKOFF MEETING 81
INTERVIEWS 82
CONDUCTING THE ASSESSMENT 84
BUILDING EXTERIOR 86
BUILDING INTERIOR 93
Chapter 7 - Security Department Operations 102
MANAGEMENT REVIEW 102
SECURITY CULTURE 103
MANAGEMENT SPAN OF CONTROL 104
SECURITY MANAGEMENT PLAN 107
STATUTORY AND REGULATORY REQUIREMENTS 107
SECURITY STAFF SCHEDULING 109
SECURITY PATROL OPERATIONS 112
SECURITY POLICIES 114
SECURITY RECORDKEEPING 115
SECURITY INCIDENT REPORT FOLLOW-UP 116
Chapter 8 - Security Training 120
STAFF SECURITY AWARENESS TRAINING 121
SECURITY OFFICER TRAINING 123
TRAINING DOCUMENTATION 127
FREQUENCY OF TRAINING 127
PROFESSIONAL CERTIFICATIONS 128
TRAINING RESOURCES 128
SUMMARY 129
Chapter 9 - Workplace Violence Risks and Vulnerabilities 130
VIOLENCE INDICATORS 132
SUSPECT PROFILING 133
WORKPLACE VIOLENCE RISK ASSESSMENT 134
DOCUMENTATION REVIEW 136
THREAT ASSESSMENT TEAM 137
PREVENTION STRATEGIES 137
RISK FORESEEABILITY 139
SUMMARY 140
Chapter 10 - Financial Risk Assessment 142
FINANCIAL ASSET MANAGEMENT 142
CASH HANDLING 143
PAID PARKING 145
LOST AND FOUND 146
TRANSPORTATION OF MONEY 148
FIDUCIARY RESPONSIBILITY 149
Chapter 11 - Security Technology Assessment 152
LOCKS AND KEYS 154
SECURITY CAMERAS 154
SECURITY ALARMS 158
MASS NOTIFICATION SYSTEMS 160
SECURITY OFFICER EQUIPMENT 161
SPECIALIZED SECURITY EQUIPMENT 162
SUMMARY 164
Chapter 12 - Access Control 166
LOCK AND KEY CONTROL 166
CIPHER LOCKS 168
ELECTRONIC CARD ACCESS CONTROL 170
DOOR HARDWARE 172
VISITOR MANAGEMENT 173
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED) 174
GEOGRAPHIC CONSIDERATIONS 176
BIOMETRICS 176
Chapter 13 - Legal Considerations and Prevention Strategies 178
LITIGATION AVOIDANCE 178
CRIME PREVENTION 180
LOSS PREVENTION STRATEGIES 182
SECURITY VULNERABILITY ANALYSIS 184
THREAT IDENTIFICATION 186
SUMMARY 187
Chapter 14 - Contracted Services 188
POLICE SERVICES AND CONTRACTED STAFFING 188
ELECTRONIC SECURITY CONTRACTORS: INSTALLS 190
BACKGROUND INVESTIGATION FIRMS 192
PARKING MANAGEMENT FIRMS 193
DOCUMENT SHREDDING SERVICES 195
CONTRACT SECURITY SERVICES 196
SUMMARY 198
Chapter 15 - The Security Risk Assessment Report 200
REPORT WRITING 200
COMPONENTS OF THE ASSESSMENT REPORT 201
Chapter 16 - Conclusion 214
IMPLEMENTATION PROJECT MANAGEMENT 214
PROJECT TEAM 215
CHALLENGES 216
IMPLEMENTATION PHASE 218
TRACKING CHANGE 220
MEASURING OUTCOMES 221
LET’S DO IT AGAIN 223
Index 226
Introduction to Security Risk Assessments
Abstract
There are many names given to the term security risk assessment. In fact, the actual process of identifying security issues has been called physical security assessment, security survey, security audit, and risk assessment to name just a few. Generally speaking, it is a systematic on-site assessment and analysis of your current security measures, whether they are physical security measures, technology, operations, facilities, security management, policies, training, reports, or any other aspect of your security program or measures. This chapter will help to define the intent of an assessment, who will conduct it, and how to remain objective and unbiased throughout the project.
Keywords
Defining security risks; Physical security review; Security deficiencies or excesses; Security risk assessment; Security vulnerabilities
What Is a Security Risk Assessment?
Erscheint lt. Verlag | 22.7.2014 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Sozialwissenschaften ► Politik / Verwaltung | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
Wirtschaft ► Betriebswirtschaft / Management ► Wirtschaftsinformatik | |
ISBN-10 | 0-12-800917-9 / 0128009179 |
ISBN-13 | 978-0-12-800917-8 / 9780128009178 |
Haben Sie eine Frage zum Produkt? |
Größe: 2,3 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
Größe: 3,3 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich