The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk
The Security Risk Handbook: Assess, Survey, Audit
β Scribed by Charles Swanson
- Publisher
- Routledge
- Year
- 2023
- Tongue
- English
- Leaves
- 539
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The Security Risk Handbook assists businesses that need to be able to carry out effective security risk assessments, security surveys, and security audits. It provides guidelines and standardised detailed processes and procedures for carrying out all three stages of the security journey: assess, survey, and audit.
Packed with tools and templates, the book is extremely practical. At the end of each explanatory chapter, a unique case study can be examined by the reader in the areas of risk assessment, security survey, and security audit. This book also highlights the commercial and reputational benefits of rigorous risk management procedures. It can be applied to corporate security, retail security, critical national infrastructure security, maritime security, aviation security, counter-terrorism, and executive and close protection.
This text is relevant to security professionals across all key sectors: corporate security, retail security, critical national infrastructure security, maritime security, aviation security, counter-terrorism, and executive and close protection. It will also be useful to health and safety managers, operations managers, facilities managers, and logistics professionals whose remit is to ensure security across an organisation or function.
β¦ Table of Contents
Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
Opening statement
Book aims
List of figures
List of tables
International Security Standards and Regulations
Glossary
Acknowledgements
Foreword
Introduction
What this book is all about
Chapter 1. Risk and the Security Risk Assessment
Chapter 2. The Security Survey
Chapter 3. The Security Audit
Conclusion
The security review (for lack of a better term)
Identification: Whatβs in a title?
1 Risk and the Security Risk Assessment
The Risk Journey
Risk
Risk perception
Risk component parts
The Security Risk Assessment process
Risk communication
Security Risk Assessment of unique sectors
Corporate security
Publicly accessible locations (PAL)
Retail security
Critical national infrastructure security
Maritime security
Aviation security
Hostile environment security
Close protection
Counter-terrorism
Bibliography
2 The Security Survey
Defence in Depth (DiD)
The customer
Understanding customer needs
The six steps
Physical penetration test
Integrated security and perimeter security
Internal
Manned guarding
IDS
Lighting
Closed-circuit television (CCTV), often referred to today as video surveillance
The Security Survey report
Security Survey β unique sectors
Publicly accessible locations (PAL)
Retail security
Critical national infrastructure
Maritime security
Aviation security
Hostile environment security
Close protection
Bibliography
3 The Security Audit
The Security Audit
Security
The Security Auditor
The Security Audit process
The Security Audit report
Unique sectors
Corporate security
Publicly accessible locations
Retail security
Critical national infrastructure security
Maritime security
Aviation security
Hostile environment security
Close protection
Bibliography
Conclusion
Annexe A. Security Risk Assessment Template
Annexe B. Security Survey Template
Annexe C. Security Audit Template
Index
π SIMILAR VOLUMES
Dear Mr. Doug Landoll, I have to give you Kudo's on your book. I just bought it and its awesome!!!! There is a section that is so well written regarding the reporting structure of security and how successful the program will be based on InfoSec placement and support. I've never seen it written so w
<p>Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguards. Performed incorrectly, they can provide the false sense of security that
Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguards. Performed incorrectly, they can provide the false sense of security that al
</div><div class='box-content'><ul><li><p><span class=''review_text''><P/>''When the lst edition of this book was published, back in the 1980s, it became an instant success. Today, many years later, it stands as a classic, used by security professionals, college professors, and students around the w