Book description
A comprehensive and practical guide to security organization and planning in industrial plants
Features Basic definitions related to plant security
Features Countermeasures and response methods
Features Facilities and equipment, and security organization
Topics covered are applicable to multiple types of industrial plants
Illustrates practical techniques for assessing and evaluating financial and corporate risks
Table of contents
- Cover
- Title page
-
Chapter 1: Introduction to Security Risk Assessment and Management
- Introduction
- Business Definition
- Security Versus Risk
- Framework for Risk Management
- Value at Risk
- Calculation of Risk
- Risk Assessment Versus Risk Management
- Risk Management Plans
- Threat Scenarios
- Statistics and Mathematics
- Pairing Vulnerability and Threat Data
- Setting Priorities
- Other Definitions of Risk Assessment
- Business Definition for Risk Assessment
- Broad Definition for Risk Assessment
- Quantitative Risk Assessment
- Qualitative Risk Assessment
- Countermeasures for Vulnerabilities
- Sample Threat Scenario NO. 1 (Fig. 1.6)
- Sample Threat Scenario No. 2
- Chapter 2: Risk Assessment Basics
- Chapter 3: Assessing Types of Attacks and Threats with Data Sources
- Chapter 4: Evaluating a Company’s Protective Systems
-
Chapter 5: Port Security
- Ranking Threats
- Levels of Port Security
- Identification Procedures for Personnel Screening
- Vessel Arrival and Security Procedures While Moored
- Internal Security
- Perimeter Security and Restricted Areas
- Lighting
- Security Alarms/Video Surveillance/Communications Systems
- Training and Security Awareness
- Floating Barriers
-
Chapter 6: Basics of Cyber security
- Communications Life Cycle
- Some Solutions to the Problem of Cyber crime
- Communications Security
- Communications as Transactions
- Telephone System Security
- Radio Communications
- Digital Communications
- Cyber security
- How to Perform the Vulnerability Assessment
- Communications Procedure Design: Hints and Helps
- Benefits: Identified
- Cyber Threat Matrix: Categories of Loss and Frequency
- Setting up Internet Security
- Cyber security Tools
- Chapter 7: Scenario Planning and Analyses
- Chapter 8: Security System Design and Implementation: Practical Notes
- Appendix I: Physical Security Checklist
- Appendix II
- Index
- End User License Agreement
Product information
- Title: Industrial Security: Managing Security in the 21st Century
- Author(s):
- Release date: April 2015
- Publisher(s): Wiley
- ISBN: 9781118194638
You might also like
book
Physical Security and Safety
How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner …
book
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Use the guidance in this comprehensive field guide to gain the support of your top executives …
book
Access Control, Authentication, and Public Key Infrastructure
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control …
book
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure …