Risk Analysis and the Security Survey
By- James F. Broder, James F. Broder, CFE, CPP, FACFE, Independent Security Consultant, San Marino, CA, USA
- Gene Tucker
As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of Risk Analysis and the Security Survey. Broder and Tucker guide you through analysis to implementation to provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards.
This book will show you how to develop and maintain current business contingency and disaster recovery plans to ensure your enterprises are able to sustain loss are able to recover, and protect your assets, be it your business, your information, or yourself, from threats.
Audience
Students in security management courses; Security Managers, other security, business professionals at all levels concerned with security, risk mitigation, and the management aspects of security operations.
Hardbound, 368 Pages
Published: January 2012
Imprint: Butterworth Heinemann
ISBN: 978-0-12-382233-8
Reviews
-
"When the lst edition of this book was published, back in the 1980s, it became an instant success. Today, many years later, it stands as a classic, used by security professionals, college professors, and students around the world. This new edition addresses the problems every security executive might one day face regarding Disaster Recovery. Broder tells us how to identify and deal with these threats and vulnerabilities as well as what to do if, in spite of our best efforts, disaster strikes. This book is, without doubt, the best of its kind on the market. The contents of this book are virtually priceless and Im so bold as to suggest that without it, a security professional s library is incomplete."--Charles (Chuck) Sennewald, CPP, CSC"Jim Broder and Eugene Tucker have done it again--another fine reference for the serious-minded security professional."-- John Fay, Learning Shop USA
Contents
Part I: The Treatment and Analysis of Risk
Chapter 1: Risk
Chapter 2: Vulnerability and Threat Identification
Chapter 3: Risk Measurement
Chapter 4: Quantifying and Prioritizing Loss Potential
Chapter 5: Cost/Benefit Analysis
Chapter 6: Other Risk Analysis Methodologies
Chapter 7: The Security Survey: An Overview
Chapter 8: Management Audit Techniques and the Preliminary Survey
Chapter 9: The Survey Report
Chapter 10: Crime Prediction
Chapter 11: Determining Insurance Requirements
Part II: Emergency Managment and Business Continuity Planning
Chapter 12: Emergency Management: A Brief Introduction
Chapter 13: Mitigation and Preparedness
Chapter 14: Response Planning
Chapter 15: Business Impact Analysis
Chapter 16: Business Continuity Planning
Chapter 17: Plan Documentation
Chapter 18: Crisis Management Planning for Kidnap, Ransom, and Extortion
Chapter 19: Monitoring Safeguards
Chapter 20: The Security ConsultantAppendix A: Security Survey Work Sheets
Appendix B: Sample Kidnap and Ransom Contingency PlanAppendix C: Security Systems Specifications

