Metrics and methods for security risk management /
Saved in:
Author / Creator: | Young, Carl S. |
---|---|
Imprint: | Amsterdam ; Boston : Syngress/Elsevier, ©2010. |
Description: | 1 online resource (xx, 272 pages) : illustrations |
Language: | English |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/13598028 |
Table of Contents:
- About the Author
- Foreword
- Preface
- Acknowledgments
- Part I. The Structure of Security Risk
- Chapter 1. Security Threats and Risk
- 1.1. Introduction to Security Risk or Tales of the Psychotic Squirrel and the Sociable Shark
- 1.2. The Fundamental Expression of Security Risk
- 1.3. Introduction to Security Risk Models and Security Risk Mitigation
- 1.4. Summary
- Chapter 2. The Fundamentals of Security Risk Measurements
- 2.1. Introduction
- 2.2. Linearity and Non-linearity
- 2.3. Exponents, Logarithms and Sensitivity to Change
- 2.4. The Exponential Function e x
- 2.5. The Decibel (dB)
- 2.6. Security Risk and the Concept of Scale
- 2.7. Some Common Physical Models in Security Risk
- 2.8. Visualizing Security Risk
- 2.9. An Example: Guarding Costs
- 2.10. Summary
- Chapter 3. Risk Measurements and Security Programs
- 3.1. Introduction
- 3.2. The Security Risk Assessment Process
- 3.2.1. Unique Threats
- 3.2.2. Motivating Security Risk Mitigation: The Five Commandments of Corporate Security
- 3.2.3. Security Risk Models
- 3.3. Managing Security Risk
- 3.3.1. The Security Risk Mitigation Process
- 3.3.2. Security Risk Standards
- 3.4. Security Risk Audits
- 3.5. Security Risk Program Frameworks
- 3.6. Summary
- Part II. Measuring and Mitigating Security Risk
- Chapter 4. Measuring the Likelihood Component of Security Risk
- 4.1. Introduction
- 4.2. Likelihood or Potential for Risk?
- 4.3. Estimating the Likelihood of Randomly Occurring Security Incidents
- 4.4. Estimating The Potential for Biased Security Incidents
- 4.5. Averages and Deviations
- 4.6. Actuarial Approaches to Security Risk
- 4.7. Randomness, Loss, and Expectation Value
- 4.8. Financial Risk
- 4.9. Summary
- Chapter 5. Measuring the Vulnerability Component of Security Risk
- 5.1. Introduction
- 5.2. Vulnerability to Information Loss through Unauthorized Signal Detection
- 5.2.1. Energy, Waves and Information
- 5.2.2. Introduction to Acoustic Energy and Audible Information
- 5.2.3. Transmission of Audible Information and Vulnerability to Conversation-Level Overhears
- 5.2.4. Audible Information and the Effects of Intervening Structures
- 5.2.5. Introduction to Electromagnetic Energy and Vulnerability to Signal Detection
- 5.2.6. Electromagnetic Energy and the Effects of Intervening Structures
- 5.2.7. Vulnerability to Information Loss through Unauthorized Signal Detection: A Checklist
- 5.3. Vulnerability to Explosive Threats
- 5.3.1. Explosive Parameters
- 5.3.2. Confidence Limits and Explosive Vulnerability
- 5.4. A Theory of Vulnerability to Computer Network Infections
- 5.5. Biological, Chemical and Radiological Weapons
- 5.5.1. Introduction
- 5.5.2. Vulnerability to Radiological Dispersion Devices
- 5.5.3. Vulnerability to Biological Threats
- 5.5.4. Vulnerability to External Contaminants; Bypassing Building Filtration
- 5.5.5. Vulnerability to Chemical Threats
- 5.6. The Visual Compromise of Information
- 5.7. Summary
- Chapter 6. Mitigating Security Risk: Reducing Vulnerability
- 6.1. Introduction
- 6.2. Audible Signals
- 6.2.1. Acoustic Barriers
- 6.2.2. Sound Reflection
- 6.2.3. Sound Absorption
- 6.3. Electromagnetic Signals
- 6.3.1. Electromagnetic Shielding
- 6.3.2. Intra-Building Electromagnetic Signal Propagation
- 6.3.3. Intra-Building Electromagnetic Signal Propagation
- 6.3.4. Non-Point Source Electromagnetic Radiation
- 6.4. Vehicle-borne Explosive Threats: Barriers and Bollards
- 6.5. Explosive Threats
- 6.6. Radiological Threats
- 6.7. Biological Threats
- 6.7.1. Particulate Filtering
- 6.7.2. Ultraviolet Germicidal Irradiation (UVGI)
- 6.7.3. Combining UVGI with Particulate Filtering
- 6.7.4. More Risk Mitigation for Biological Threats
- 6.7.5. Relative Effectiveness of Influenza Mitigation
- 6.8. Mitigating the Risk of Chemical Threats (briefly noted)
- 6.9. Guidelines on Reducing the Vulnerability to Non-Traditional Threats in Commercial Facilities
- 6.10. Commercial Technical Surveillance Countermeasures (TSCM)
- 6.11. Electromagnetic Pulse (EMP) Weapons
- 6.12. Summary
- Epilogue
- Appendix A.
- Appendix B.
- Appendix C.
- Appendix D.
- Appendix E.
- Appendix F.
- Appendix G.
- Appendix H.
- Index