Book description
Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem.
Metrics and Methods for Security Risk Management is of interest, especially since the 9/11 terror attacks, because it addresses the ways to manage risk security in the corporate world. The book aims to provide information about the fundamentals of security risks and the corresponding components, an analytical approach to risk assessments and mitigation, and quantitative methods to assess the risk components. In addition, it also discusses the physical models, principles, and quantitative methods needed to assess the risk components. The by-products of the methodology used include security standards, audits, risk metrics, and program frameworks. Security professionals, as well as scientists and engineers who are working on technical issues related to security problems will find this book relevant and useful.
- Offers an integrated approach to assessing security risk
- Addresses homeland security as well as IT and physical security issues
- Describes vital safeguards for ensuring true business continuity
Table of contents
- Cover Image
- Table of Contents
- Front matter
- Copyright
- Dedication
- About the Author
- Foreword
- Preface
- Acknowledgments
- Chapter 1. Security threats and risk
- 1.1. Introduction to security risk or tales of the psychotic squirrel and the sociable shark
- 1.2. The fundamental expression of security risk
- 1.3. Introduction to security risk models and security risk mitigation
- 1.4. Summary
- Chapter 2. The fundamentals of security risk measurements
- 2.1. Introduction
- 2.2. Linearity and nonlinearity
- 2.3. Exponents, logarithms, and sensitivity to change
- 2.4. The exponential function ex
- 2.5. The decibel
- 2.6. Security risk and the concept of scale
- 2.7. Some common physical models in security risk
- 2.8. Visualizing security risk
- 2.9. An example: guarding costs
- 2.10. Summary
- Chapter 3. Security risk measurements and security programs
- 3.1. Introduction
- 3.2. The security risk assessment process
- 3.3. Managing security risk
- 3.4. Security risk audits
- 3.5. Security risk program frameworks
- 3.6. Summary
- Chapter 4. Measuring the likelihood component of security risk
- 4.1. Introduction
- 4.2. Likelihood or potential for risk?
- 4.3. Estimating the likelihood of randomly occurring security incidents
- 4.4. Estimating the potential for biased security incidents
- 4.5. Averages and deviations
- 4.6. Actuarial approaches to security risk
- 4.7. Randomness, loss, and expectation value
- 4.8. Financial risk
- 4.9. Summary
- Chapter 5. Measuring the vulnerability component of security risk
- 5.1. Introduction
- 5.2. Vulnerability to information loss through unauthorized signal detection
- 5.3. Vulnerability to explosive threats
- 5.4. A theory of vulnerability to computer network infections
- 5.5. Biological, chemical, and radiological weapons
- 5.6. The visual compromise of information
- 5.7. Summary
- Chapter 6. Mitigating security risk
- 6.1. Introduction
- 6.2. Audible signals
- 6.3. Electromagnetic signals
- 6.4. Vehicle-borne explosive threats: barriers and bollards
- 6.5. Explosive threats
- 6.6. Radiological threats
- 6.7. Biological threats
- 6.8. Mitigating the risk of chemical threats (briefly noted)
- 6.9. Guidelines for reducing the vulnerability to non-traditional threats in commercial facilities
- 6.10. Commercial technical surveillance countermeasures
- 6.11. Electromagnetic pulse weapons
- 6.12. Summary
- Epilogue
- Appendix A. Scientific prefixes
- Appendix B. Sound levels and intensities
- Appendix C. The speed of sound in common materials
- Appendix D. Closed circuit television (CCTV) performance criteria and technical specifications
- Appendix E. Physical access authorization system performance criteria
- Appendix F. Exterior barrier performance criteria and technical specifications
- Appendix G. Window anti-blast methods technical specifications*
- Appendix H. Qualitative interpretation of Rw values
- Index
Product information
- Title: Metrics and Methods for Security Risk Management
- Author(s):
- Release date: August 2010
- Publisher(s): Syngress
- ISBN: 9781856179799
You might also like
book
Information Security Management Metrics
Information Security Management Metrics offers a step-by-step approach to developing and implementing relevant security metrics that …
book
Operational Risk Management, 2nd Edition
Identify, assess, and mitigate operational risk with this practical and authoritative guide In the newly revised …
book
Corporate Risk Management
An updated review of the theories and applications of corporate risk management After the financial crisis …
book
Empowered Enterprise Risk Management
In this book, two experts on the topic raise the question of why many ERM programmes …