O'Reilly logo

Security Risk Assessment by John M. White

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Note: Page numbers followed by f indicate figures; t, tables; b, boxes.

A
Access control
biometrics in, 159–160
cipher locks for, 151–153, 152f
CPTED in, 72, 157, 159
door hardware and, 155–156
geography in, 159
report findings, 188f, 189
visitor management in, 155, 157
Active monitoring, of security cameras, 137–139
Active shooter, 113–114, 117
Alarms, See Security alarms
ASIS International, 157
Assessment, 67, 68f
See also specific topics
Assessment recommendations, 196, 203
Assessment team, 64–65
internal personnel for, 34
manager for, 198–199
for threat assessment, 120
B
Background investigations, 175
data entry errors and, 175–176
due diligence of, 175–176
failures of, 175
Beat cops, 22
Best practices, See Security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required