Index

Note: Page numbers followed by f indicate figures; t, tables; b, boxes.

A
Access control
biometrics in, 159–160
cipher locks for, 151–153, 152f
CPTED in, 72, 157, 159
door hardware and, 155–156
geography in, 159
report findings, 188f, 189
visitor management in, 155, 157
Active monitoring, of security cameras, 137–139
Active shooter, 113–114, 117
Alarms, See Security alarms
ASIS International, 157
Assessment, 67, 68f
See also specific topics
Assessment recommendations, 196, 203
Assessment team, 64–65
internal personnel for, 34
manager for, 198–199
for threat assessment, 120
B
Background investigations, 175
data entry errors and, 175–176
due diligence of, 175–176
failures of, 175
Beat cops, 22
Best practices, See Security ...

Get Security Risk Assessment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.