
Chapter 4
Crime Analysis
In this chapter...
Statistics for Security Management
Crime Triangle
Purpose of Crime Analysis
Data Sources
Law Enforcement Data versus Social Disorder Models
Advantages of Law Enforcement Data
Geographic Levels
Methodology
Return on Security Investment
51
TAG's Risk Assessment Process
®
Asset
Identification
Current
Security
Measures
Policies &
Procedures
Physical
Security
Security
Personnel
Threat
Assessment
Vulnerability
Assessment
Risk
Assessment
Cost
Benefit
Analysis
Report and
Recommendations
Crime
Analysis
Figure 4-1.
Strategic Risk Assessment Process, Copyright ©2007 by Threat Analysis Group,
LLC. Used by permission. Additional information available from Threat
Analysis Group, LLC via www.threatanalysis.com.
Get Strategic Security Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.