
Risk Analysis and the Security Survey
Description
Key Features
- Offers powerful techniques for weighing and managing the risks that face your organization
- Gives insights into universal principles that can be adapted to specific situations and threats
- Covers topics needed by homeland security professionals as well as IT and physical security managers
Readership
Table of Contents
Dedication
About the Authors
Acknowledgments
Introduction
1. Risk
2. Vulnerability and Threat Identification
3. Risk Measurement
4. Quantifying and Prioritizing Loss Potential
5. Cost/Benefit Analysis
6. Other Risk Analysis Methodologies
7. The Security Survey
8. Management Audit Techniques and the Preliminary Survey
9. The Survey Report
10. Crime Prediction
11. Determining Insurance Requirements
12. Emergency Management – A Brief Introduction
13. Mitigation and Preparedness
14. Response Planning
15. Business Impact Analysis
16. Business Continuity Planning
17. Plan Documentation
18. Crisis Management Planning for Kidnap, Ransom, and Extortion
19. Monitoring Safeguards
20. The Security Consultant
Appendix A. Security Survey Work Sheets
Appendix B. Sample Kidnap and Ransom Contingency Plan
Appendix C. Security Systems Specifications
Index
Product details
- No. of pages: 368
- Language: English
- Copyright: © Butterworth-Heinemann 2012
- Published: December 7, 2011
- Imprint: Butterworth-Heinemann
- Hardcover ISBN: 9780123822338
- eBook ISBN: 9780123822345
About the Authors
James F. Broder
enforcement. He has worked as a security executive, instructor, and consultant as well as having
served in Vietnam as a Police Advisor in the Counter Insurgency Directorate, Vietnamese
National Police. A former FBI Special Agent and employee for the US State Department, U.S. House of Representatives, Washington D.C. Mr. Broder is considered to be one of the most highly respected security authorities in the United States.
Affiliations and Expertise
Gene Tucker

Affiliations and Expertise
Ratings and Reviews
There are currently no reviews for "Risk Analysis and the Security Survey"