
- 368 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Risk Analysis and the Security Survey
About this book
As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of Risk Analysis and the Security Survey. Broder and Tucker guide you through analysis to implementation to provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards.This book will show you how to develop and maintain current business contingency and disaster recovery plans to ensure your enterprises are able to sustain loss are able to recover, and protect your assets, be it your business, your information, or yourself, from threats.- Offers powerful techniques for weighing and managing the risks that face your organization- Gives insights into universal principles that can be adapted to specific situations and threats- Covers topics needed by homeland security professionals as well as IT and physical security managers
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover image
- Table of Contents
- Front-matter
- Copyright
- Dedication
- About the Authors
- Acknowledgments
- Introduction
- 1. Risk
- 2. Vulnerability and Threat Identification
- 3. Risk Measurement
- 4. Quantifying and Prioritizing Loss Potential
- 5. Cost/Benefit Analysis
- 6. Other Risk Analysis Methodologies
- 7. The Security Survey
- 8. Management Audit Techniques and the Preliminary Survey
- 9. The Survey Report
- 10. Crime Prediction
- 11. Determining Insurance Requirements
- 12. Emergency Management – A Brief Introduction
- 13. Mitigation and Preparedness
- 14. Response Planning
- 15. Business Impact Analysis
- 16. Business Continuity Planning
- 17. Plan Documentation
- 18. Crisis Management Planning for Kidnap, Ransom, and Extortion
- 19. Monitoring Safeguards
- 20. The Security Consultant
- Appendix A. Security Survey Work Sheets
- Appendix B. Sample Kidnap and Ransom Contingency Plan
- Appendix C. Security Systems Specifications
- Index