+612 9045 4394
Risk Analysis and the Security Survey - Eugene Tucker

Risk Analysis and the Security Survey


Published: 22nd February 2006
Format: PDF
or 4 easy payments of $25.56 with Learn more
    Good For
  • IOS and Android Devices (Booktopia Reader app)
  • PC & Mac (Adobe Digital Editions)
  • Kobo / Sony / eReaders
    Not supported
  • Amazon Kindle
  • Windows Smart Phones
  • Adobe Overdrive
  • Adobe Reader
  • Scanned pages
  • Resizeable Text
  • Flowing Text
  • Reproducing or Printing Pages

Security and risk management are principally concerned with the protection and conservation of corporate assets and resources. The task of protection continues to be an increasingly complex one in a time when technology is creating new products (and thus risk) at an explosive rate. Add this to the crime rate -- now aggravated by domestic and international terrorism -- and the importance of risk analysis and evaluation to design proper protection becomes self-evident.

With an awareness of the growing threat of global terrorism, the third edition of RISK ANALYSIS AND THE SECURITY SURVEY has been completely updated. It includes two new chapters covering disaster recover planning, mitigation, and the evolving methodologies that are a result of the Homeland Security Act. The following topics will also be added and covered among the various chapters: contingency planning, testing of disaster response plan, managing during a crisis, maintaining and testing a response plan (team drills, etc.), bomb threats and suicide bombings, and prevention techniques to better prepare business for new post 9/11 security risks.

- Covers Business Impact Analysis (BIA), Project Planning, Data Collection, Data Analysis and Report of Findings, and Prediction of Criminal Behavior
- Presents updated statistical information and practical case examples
- Helps professionals and students produce more effective results-oriented security surveys


Chapter 1: Risk
Chapter 2: Vulnerability and Threat Identification
Chapter 3: Risk Measurement
Chapter 4: Quantifying and Prioritizing Loss Potential
Chapter 5: Cost/Benefit Analysis
Chapter 6: Other Risk Analysis Methodologies
Chapter 7: The Security Survey: An Overview
Chapter 8: Management Audit Techniques and the Preliminary Survey
Chapter 9: The Survey Report
Chapter 10: Crime Prediction
Chapter 11: Determining Insurance Requirements
Chapter 12: Mitigation and Preparedness
Chapter 13: Response Planning
Chapter 14: Business Continuity Planning
Chapter 15: Business Impact Analysis
Chapter 16: Plan Documentation
Chapter 17: Crisis Management Planning for Kidnap, Ransom and Extortion
Chapter 18: Monitoring Safeguards
Chapter 19: The Security Consultant

A. Security Survey Work Sheets
B. Danger Signs of Fraud, Embezzlement, and Theft
C. Professional Practices for Business Continuity Planners
D. Sample BIA Introduction Letter
E Sample Kidnap and Ransom Contingency Plan
F. How to Establish Notice
G. Communicating with the Media
H. Security System Specifications
I. Sample Introduction Memorandum: Disaster Recovery Planning

ISBN: 9780080480725
ISBN-10: 0080480721
Format: PDF
Language: English
Published: 22nd February 2006
Publisher: Elsevier Science
Edition Number: 3