| About the Author | p. xi |
| Foreword | p. xiii |
| Preface | p. xv |
| Acknowledgments | p. xix |
| The Structure of Security Risk | |
| Security Threats and Risk | p. 3 |
| Introduction to Security Risk or Tales of the Psychotic Squirrel and the Sociable Shark | p. 3 |
| The Fundamental Expression of Security Risk | p. 9 |
| Introduction to Security Risk Models and Security Risk Mitigation | p. 14 |
| Summary | p. 17 |
| The Fundamentals of Security Risk Measurements | p. 19 |
| Introduction | p. 19 |
| Linearity and Non-linearity | p. 19 |
| Exponents, Logarithms and Sensitivity to Change | p. 25 |
| The Exponential Function ex | p. 27 |
| The Decibel (dB) | p. 28 |
| Security Risk and the Concept of Scale | p. 31 |
| Some Common Physical Models in Security Risk | p. 33 |
| Visualizing Security Risk | p. 37 |
| An Example: Guarding Costs | p. 42 |
| Summary | p. 43 |
| Risk Measurements and Security Programs | p. 45 |
| Introduction | p. 45 |
| The Security Risk Assessment Process | p. 47 |
| Unique Threats | p. 47 |
| Motivating Security Risk Mitigation: The Five Commandments of Corporate Security | p. 48 |
| Security Risk Models | p. 49 |
| Managing Security Risk | p. 54 |
| The Security Risk Mitigation Process | p. 54 |
| Security Risk Standards | p. 58 |
| Security Risk Audits | p. 70 |
| Security Risk Program Frameworks | p. 73 |
| Summary | p. 73 |
| Measuring and Mitigating Security Risk | |
| Measuring the Likelihood Component of Security Risk | p. 81 |
| Introduction | p. 81 |
| Likelihood or Potential for Risk? | p. 82 |
| Estimating the Likelihood of Randomly Occurring Security Incidents | p. 85 |
| Estimating The Potential for Biased Security Incidents | p. 88 |
| Averages and Deviations | p. 91 |
| Actuarial Approaches to Security Risk | p. 97 |
| Randomness, Loss, and Expectation Value | p. 99 |
| Financial Risk | p. 106 |
| Summary | p. 107 |
| Measuring the Vulnerability Component of Security Risk | p. 109 |
| Introduction | p. 109 |
| Vulnerability to Information Loss through Unauthorized Signal Detection | p. 110 |
| Energy, Waves and Information | p. 111 |
| Introduction to Acoustic Energy and Audible Information | p. 115 |
| Transmission of Audible Information and Vulnerability to Conversation-Level Overhears | p. 117 |
| Audible Information and the Effects of Intervening Structures | p. 120 |
| Introduction to Electromagnetic Energy and Vulnerability to Signal Detection | p. 126 |
| Electromagnetic Energy and the Effects of Intervening Structures | p. 132 |
| Vulnerability to Information Loss through Unauthorized Signal Detection: A Checklist | p. 135 |
| Vulnerability to Explosive Threats | p. 136 |
| Explosive Parameters | p. 136 |
| Confidence Limits and Explosive Vulnerability | p. 142 |
| A Theory of Vulnerability to Computer Network Infections | p. 146 |
| Biological, Chemical and Radiological Weapons | p. 151 |
| Introduction | p. 151 |
| Vulnerability to Radiological Dispersion Devices | p. 152 |
| Vulnerability to Biological Threats | p. 162 |
| Vulnerability to External Contaminants; Bypassing Building Filtration | p. 168 |
| Vulnerability to Chemical Threats | p. 172 |
| The Visual Compromise of Information | p. 173 |
| Summary | p. 175 |
| Mitigating Security Risk: Reducing Vulnerability | p. 179 |
| Introduction | p. 179 |
| Audible Signals | p. 180 |
| Acoustic Barriers | p. 182 |
| Sound Reflection | p. 184 |
| Sound Absorption | p. 185 |
| Electromagnetic Signals | p. 187 |
| Electromagnetic Shielding | p. 187 |
| Intra-Building Electromagnetic Signal Propagation | p. 191 |
| Intra-Building Electromagnetic Signal Propagation | p. 194 |
| Non-Point Source Electromagnetic Radiation | p. 195 |
| Vehicle-borne Explosive Threats: Barriers and Bollards | p. 198 |
| Explosive Threats | p. 203 |
| Radiological Threats | p. 206 |
| Biological Threats | p. 210 |
| Particulate Filtering | p. 210 |
| Ultraviolet Germicidal Irradiation (UVGI) | p. 212 |
| Combining UVGI with Particulate Filtering | p. 214 |
| More Risk Mitigation for Biological Threats | p. 216 |
| Relative Effectiveness of Influenza Mitigation | p. 217 |
| Mitigating the Risk of Chemical Threats (briefly noted) | p. 222 |
| Guidelines on Reducing the Vulnerability to Non-Traditional Threats in Commercial Facilities | p. 224 |
| Commercial Technical Surveillance Countermeasures (TSCM) | p. 225 |
| Electromagnetic Pulse (EMP) Weapons | p. 234 |
| Summary | p. 238 |
| Epilogue | p. 243 |
| p. 245 |
| p. 247 |
| p. 249 |
| p. 251 |
| p. 253 |
| p. 255 |
| p. 257 |
| p. 259 |
| Index | p. 261 |
| Table of Contents provided by Ingram. All Rights Reserved. |