𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Risk Analysis and the Security Survey

✍ Scribed by James F. Broder and Gene Tucker (Auth.)


Publisher
Butterworth Heinemann
Year
2012
Tongue
English
Leaves
342
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


  • ''When the lst edition of this book was published, back in the 1980s, it became an instant success. Today, many years later, it stands as a classic, used by security professionals, college professors, and students around the world. This new edition addresses the problems every security executive might one day face regarding Disaster Recovery. Broder tells us how to identify and deal with these threats and vulnerabilities as well as what to do if, in spite of our best efforts, disaster strikes. This book is, without doubt, the best of its kind on the market. The contents of this book are virtually priceless and IΒ’m so bold as to suggest that without it, a security professionalΒ’ s library is incomplete.''--Charles (Chuck) Sennewald, CPP, CSC

    ''Jim Broder and Eugene Tucker have done it again--another fine reference for the serious-minded security professional.''-- John Fay, Learning Shop USA


✦ Table of Contents


Content:
Front-matter, Pages i,iii
Copyright, Page iv
Dedication, Pages v,vii
About the Authors, Page xv
Acknowledgments, Pages xvii-xviii
Introduction, Pages xix-xx
1 - Risk, Pages 3-8
2 - Vulnerability and Threat Identification, Pages 9-20
3 - Risk Measurement, Pages 21-27
4 - Quantifying and Prioritizing Loss Potential, Pages 29-32
5 - Cost/Benefit Analysis, Pages 33-38
6 - Other Risk Analysis Methodologies, Pages 39-44
7 - The Security Survey: An Overview, Pages 45-52
8 - Management Audit Techniques and the Preliminary Survey, Pages 53-67
9 - The Survey Report, Pages 69-78
10 - Crime Prediction, Pages 79-89
11 - Determining Insurance Requirements, Pages 91-98
12 - Emergency Management – A Brief Introduction, Pages 101-112
13 - Mitigation and Preparedness, Pages 113-133
14 - Response Planning, Pages 135-200
15 - Business Impact Analysis, Pages 201-222
16 - Business Continuity Planning, Pages 223-245
17 - Plan Documentation, Pages 247-257
18 - Crisis Management Planning for Kidnap, Ransom, and Extortion, Pages 259-271
19 - Monitoring Safeguards, Pages 273-278
20 - The Security Consultant, Pages 279-288
Appendix A - Security Survey Work Sheets, Pages 291-307
Appendix B - Sample Kidnap and Ransom Contingency Plan, Pages 309-321
Appendix C - Security Systems Specifications, Pages 323-327
Index, Pages 329-348


πŸ“œ SIMILAR VOLUMES


The Security Risk Handbook: Assess, Surv
✍ Charles Swanson πŸ“‚ Library πŸ“… 2023 πŸ› Routledge 🌐 English

The Security Risk Handbook assists businesses that need to be able to carry out effective security risk assessments, security surveys, and security audits. It provides guidelines and standardised detailed processes and procedures for carrying out all three stages of the security journey: assess, sur

Risk Analysis and Security Countermeasur
✍ Thomas L. Norman CPP PSP CSC πŸ“‚ Library πŸ“… 2009 🌐 English

When properly conducted, risk analysis enlightens, informs, and illuminates, helping management organize their thinking into properly prioritized, cost-effective action. Poor analysis, on the other hand, usually results in vague programs with no clear direction and no metrics for measurement. Althou

Information Security Risk Analysis
✍ Thomas R. Peltier πŸ“‚ Library πŸ“… 2001 🌐 English

Risk is a cost of doing business. The question is, "What are the risks, and what are their costs?" Knowing the vulnerabilities and threats that face your organization's information and systems is the first essential step in risk management. Information Security Risk Analysis shows you how to use cos

Information Security Risk Analysis
✍ Thomas R. Peltier πŸ“‚ Library πŸ“… 2005 πŸ› Auerbach Publications 🌐 English

The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their enterprises. This crucial process should not be a long, drawn-out affair. To be effective, it must be done quickly and efficiently.

Information Security Risk Analysis
✍ Thomas R. Peltier πŸ“‚ Library πŸ“… 2010 πŸ› CRC Press; Auerbach Publications 🌐 English

Offers readers with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment. This title demonstrates how to identify threats and then determine if those threats pose a real risk. It is suitable for industry and academia professionals.</div> <br> Abstract: