Index 385
control evaluation in, 144–145
crime risk analysis, 275–276
definition of, 14, 110, 112, 134, 136
description of, 9–10
documentation of results, 148
existing security measures, 111
frequency of, 157
General Security Risk Assessment
Guideline, 279–282
hybrid, 13, 112, 137
impact analysis, 145–146
information gathering for, 141
likelihood determination in, 145
purpose of, 24, 110, 278–282
qualitative, 112, 137
quantitative, 112–113, 137–138
risk management vs., 134
schematic diagram of, 12f, 20f, 27f,
51f, 85f, 109f, 217f, 231f
situational crime prevention and,
similarities between, 164
specialized methodologies, 113–114
stages involved in, 112
steps involved in, 110–111
threat assessment as part of, 111,
141–143
vulnerability assessment as part of,
111–112, 118, 143–144, 171
Risk assessment report
description of, 116–119, 148
sample, 325–340
Risk assumption, 149
Risk avoidance, 114–115, 149
Risk determination, 146–147
Risk limitation, 149
Risk management
convergence, 133–134
definition of, 14, 114, 134
elements of, 110
evaluation, 156–157
information technology. See
Information technology risk
management
purpose of, 110, 134
refinement, 156–157
risk assessment vs., 134
Risk mitigation
control recommendations for,
147–148
definition of, 114–116, 148
frequency of, 157
for information technology, 134
options for, 149, 280–281
strategy for, 149–150
subprocesses in, 148–149
Risk planning, 149
Risk reduction, 115
Risk scale, 147t
Risk spreading, 115
Risk transfer, 115
Risk transference, 149
Robbery
bank, 43
situational elements of facility
associated with, 43
types of, 43
Roe v. The Marriott Hotel, 271
Routine activity theory, 53, 162,
166–167
S
Sarbanes-Oxley, 178
Scenario-based vulnerability
assessments, 90–91
Security
convenience vs., 280
facility, 24–25
national standards, 276–278
ordinances regarding, 276
perimeter. See Perimeter security
physical. See Physical security
countermeasures
policies and procedures, 22
regulations for, 276
statistics use in, 52
statutes regarding, 276
top-down approach to, 175
Security administration, 152
Security assessments
risk. See Risk assessment
security areas addressed by, 24
threats. See Threat assessments

Get Strategic Security Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.