𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

The Security Risk Handbook: Assess, Survey, Audit

✍ Scribed by Charles Swanson


Publisher
Routledge
Year
2023
Tongue
English
Leaves
539
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The Security Risk Handbook assists businesses that need to be able to carry out effective security risk assessments, security surveys, and security audits. It provides guidelines and standardised detailed processes and procedures for carrying out all three stages of the security journey: assess, survey, and audit.

Packed with tools and templates, the book is extremely practical. At the end of each explanatory chapter, a unique case study can be examined by the reader in the areas of risk assessment, security survey, and security audit. This book also highlights the commercial and reputational benefits of rigorous risk management procedures. It can be applied to corporate security, retail security, critical national infrastructure security, maritime security, aviation security, counter-terrorism, and executive and close protection.

This text is relevant to security professionals across all key sectors: corporate security, retail security, critical national infrastructure security, maritime security, aviation security, counter-terrorism, and executive and close protection. It will also be useful to health and safety managers, operations managers, facilities managers, and logistics professionals whose remit is to ensure security across an organisation or function.

✦ Table of Contents


Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
Opening statement
Book aims
List of figures
List of tables
International Security Standards and Regulations
Glossary
Acknowledgements
Foreword
Introduction
What this book is all about
Chapter 1. Risk and the Security Risk Assessment
Chapter 2. The Security Survey
Chapter 3. The Security Audit
Conclusion
The security review (for lack of a better term)
Identification: What’s in a title?
1 Risk and the Security Risk Assessment
The Risk Journey
Risk
Risk perception
Risk component parts
The Security Risk Assessment process
Risk communication
Security Risk Assessment of unique sectors
Corporate security
Publicly accessible locations (PAL)
Retail security
Critical national infrastructure security
Maritime security
Aviation security
Hostile environment security
Close protection
Counter-terrorism
Bibliography
2 The Security Survey
Defence in Depth (DiD)
The customer
Understanding customer needs
The six steps
Physical penetration test
Integrated security and perimeter security
Internal
Manned guarding
IDS
Lighting
Closed-circuit television (CCTV), often referred to today as video surveillance
The Security Survey report
Security Survey – unique sectors
Publicly accessible locations (PAL)
Retail security
Critical national infrastructure
Maritime security
Aviation security
Hostile environment security
Close protection
Bibliography
3 The Security Audit
The Security Audit
Security
The Security Auditor
The Security Audit process
The Security Audit report
Unique sectors
Corporate security
Publicly accessible locations
Retail security
Critical national infrastructure security
Maritime security
Aviation security
Hostile environment security
Close protection
Bibliography
Conclusion
Annexe A. Security Risk Assessment Template
Annexe B. Security Survey Template
Annexe C. Security Audit Template
Index


πŸ“œ SIMILAR VOLUMES


The Security Risk Assessment Handbook
✍ Douglas J. Landoll, Douglas Landoll πŸ“‚ Library πŸ“… 2005 πŸ› Auerbach Publications 🌐 English

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk

The Security Risk Assessment Handbook: A
✍ Douglas J. Landoll, Douglas Landoll πŸ“‚ Library πŸ“… 2005 πŸ› Auerbach Publications 🌐 English

Dear Mr. Doug Landoll, I have to give you Kudo's on your book. I just bought it and its awesome!!!! There is a section that is so well written regarding the reporting structure of security and how successful the program will be based on InfoSec placement and support. I've never seen it written so w

The Security Risk Assessment Handbook: A
✍ Douglas Landoll πŸ“‚ Library πŸ“… 2021 πŸ› CRC Press 🌐 English

<p>Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguards. Performed incorrectly, they can provide the false sense of security that

The Security Risk Assessment Handbook: A
✍ Douglas Landoll πŸ“‚ Library πŸ“… 2011 πŸ› CRC Press 🌐 English

Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguards. Performed incorrectly, they can provide the false sense of security that al

Risk Analysis and the Security Survey
✍ James F. Broder and Gene Tucker (Auth.) πŸ“‚ Library πŸ“… 2012 πŸ› Butterworth Heinemann 🌐 English

</div><div class='box-content'><ul><li><p><span class=''review_text''><P/>''When the lst edition of this book was published, back in the 1980s, it became an instant success. Today, many years later, it stands as a classic, used by security professionals, college professors, and students around the w