Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures
Author Information
Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'ConnorProduct Details
ISBN: 9780471793526Publish Date: 03/05/2007
Publisher: Wiley
Number of pages: 384
Description
This guidebook sets forth a systematic, proven set of best practices for security risk assessment and management of buildings and their supporting infrastructures. These practices are all designed to optimize the security of workplace environments for occupants and to protect the interests of owners and other stakeholders. The methods set forth by the authors stem from their research at Sandia National Laboratories and their practical experience working with both government and private facilities.
Following the authors' step-by-step methodology for performing a complete risk assessment, you learn to:
- Identify regional and site-specific threats that are likely and credible
- Evaluate the consequences of these threats, including loss of life and property, economic impact, as well as damage to symbolic value and public confidence
- Assess the effectiveness of physical and cyber security systems and determine site-specific vulnerabilities in the security system
The authors further provide you with the analytical tools needed to determine whether to accept a calculated estimate of risk or to reduce the estimated risk to a level that meets your particular security needs. You then learn to implement a risk-reduction program through proven methods to upgrade security to protect against a malicious act and/or mitigate the consequences of the act.
This comprehensive risk assessment and management approach has been used by various organizations, including the U.S. Bureau of Reclamation, the U.S. Army Corps of Engineers, the Bonneville Power Administration, and numerous private corporations, to assess and manage security risk at their national infrastructure facilities. With its plain-English presentation coupled with step-by-step procedures, flowcharts, worksheets, and checklists, you can easily implement the same proven approach and methods for your organization or clients. Additional forms and resources are available online at www.wiley.com/go/securityrisk.
Related The East Texan Textbooks
CONTINUE RENT TEXTBOOKS SEARCH
FOLLOW OUR NEWSPAPER
LATEST THE EAST TEXAN NEWS
- 'Expendables 2' epitomizes dumb but fun action
- 'The Bourne Legacy' disappoints with same old thrills
- Tasteless 'Total Recall' remake leaves audiences underwhelmed
- Actor chemistry saves 'The Watch' from being boring waste
- Batman goes out strong in final 'Dark Knight' film
- 'Ted' marks promising film career for McFarlane
- Stylistic choices sink 'Savages'