Risk Analysis and Security Countermeasure Selection, Second Edition.
[Book]
Thomas L CPP/PSP/CSC Norman
2nd ed (Online-ausg.)
Hoboken
CRC Press
2015
((472 Seiten)).
EBL-Schweitzer
Preface. Acknowledgments. Author. Risk Analysis: The Basis for Appropriate and Economical Countermeasures. Risk Analysis Basics and DHS-Approved Risk Analysis Methods. Risk Analysis Skills and Tools. Critical Thinking and the Risk Analysis Process. Asset Characterization and Identification. Criticality and Consequence Analysis. Threat Analysis. Assessing Vulnerability. Estimating Probability. Risk Analysis Process. Prioritizing Risk. Security Policy Introduction. Security Policy and Countermeasure Goals. Developing Effective Security Policies. Countermeasure Goals and Strategies. Types of Countermeasures. Countermeasure Selection and Budgeting Tools. Security Effectiveness Metrics. Cost Effectiveness Metrics. Writing Effectiveness Reports.
Front Cover; Dedication; Contents; Preface; Acknowledgments; Author; Chapter 1: Risk Analysis : The Basis for Appropriate and Economical Countermeasures; Chapter 2: Risk Analysis Basics and DHS-Approved Risk Analysis Methods; Chapter 3: Risk Analysis Skills and Tools; Chapter 4: Critical Thinking and the Risk Analysis Process; Chapter 5: Asset Characterization and Identification; Chapter 6: Criticality and Consequence Analysis; Chapter 7: Threat Analysis; Chapter 8: Assessing Vulnerability; Chapter 9: Estimating Probability; Chapter 10: Risk Analysis Process; Chapter 11: Prioritizing Risk.Chapter 12: Security Policy IntroductionChapter 13: Security Policy and Countermeasure Goals; Chapter 14: Developing Effective Security Policies; Chapter 15: Countermeasure Goals and Strategies; Chapter 16: Types of Countermeasures; Chapter 17: Countermeasure Selection and Budgeting Tools; Chapter 18: Security Effectiveness Metrics; Chapter 19: Cost-Effectiveness Metrics; Chapter 20: Writing Effective Reports; Back Cover.This new edition of Risk Analysis and Security Countermeasure Selection presents updated case studies and introduces existing and new methodologies and technologies for addressing existing and future threats. It covers risk analysis methodologies approved by the U.S. Department of Homeland Security and shows how to apply them to other organizations, public and private. It also helps the reader understand which methodologies are best to use for a particular facility and demonstrates how to develop an efficient security system. Drawing on over 35 years of experience in the security industry, Thom.