did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780471793526

Security Risk Assessment and Management : A Professional Practice Guide for Protecting Buildings and Infrastructures

by ; ;
  • ISBN13:

    9780471793526

  • ISBN10:

    0471793523

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2007-03-12
  • Publisher: Wiley

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $127.94 Save up to $66.62
  • Rent Book $109.69
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    IN STOCK USUALLY SHIPS IN 24 HOURS.
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Proven set of best practices for security risk assessment and management, explained in plain English This guidebook sets forth a systematic, proven set of best practices for security risk assessment and management of buildings and their supporting infrastructures. These practices are all designed to optimize the security of workplace environments for occupants and to protect the interests of owners and other stakeholders. The methods set forth by the authors stem from their research at Sandia National Laboratories and their practical experience working with both government and private facilities. Following the authors' step-by-step methodology for performing a complete risk assessment, you learn to: Identify regional and site-specific threats that are likely and credible Evaluate the consequences of these threats, including loss of life and property, economic impact, as well as damage to symbolic value and public confidence Assess the effectiveness of physical and cyber security systems and determine site-specific vulnerabilities in the security system The authors further provide you with the analytical tools needed to determine whether to accept a calculated estimate of risk or to reduce the estimated risk to a level that meets your particular security needs. You then learn to implement a risk-reduction program through proven methods to upgrade security to protect against a malicious act and/or mitigate the consequences of the act. This comprehensive risk assessment and management approach has been used by various organizations, including the U.S. Bureau of Reclamation, the U.S. Army Corps of Engineers, the Bonneville Power Administration, and numerous private corporations, to assess and manage security risk at their national infrastructure facilities. With its plain-English presentation coupled with step-by-step procedures, flowcharts, worksheets, and checklists, you can easily implement the same proven approach and methods for your organization or clients. Additional forms and resources are available online at www.wiley.com/go/securityrisk .

Author Biography

BETTY E. BIRINGER is currently the manager of the Security Risk Assessment Department at Sandia National Laboratories. She has developed security risk assessment methodologies for dams, high-voltage electric power transmission, chemical facilities, communities, and energy infrastructures that connect the gas industry to the electric power grid. She previously managed projects for the Office of Counterintelligence, where she developed a risk method to address the insider threat.

RUDOLPH V. MATALUCCI, PhD, PE, is a retired Lieutenant Colonel in the United States Air Force and President of Rudolph Matalucci Consultants, Inc. Prior to starting his consulting firm, Dr. Matalucci was a project engineer/manager for Sandia National Laboratories, where he directed numerous risk-related projects for the Department of Energy, the Department of Defense, several other government agencies, and private organizations. He has developed, validated, implemented, and taught risk assessment methodologies for dams/locks/levees, electric power generation/transmission facilities, buildings, and other infrastructures.

SHARON L. O'CONNOR is a Principal Member of the Laboratory Staff in the Security Systems and Technology Center at Sandia National Laboratories. For the last ten years, she has supported Architectural Surety© and security risk assessment work. Her baccalaureate degree is from the University of New Mexico.

Table of Contents

Security Risk Assessment and Management Process
Introduction
Security Risk Equation
Security Risk Assessment and Management Process
Facility Characterization
Threat Analysis
Consequence Analysis
System Effectiveness Assessment
Risk Estimation
Comparison of Estimated Risk Levels
Risk Reduction Strategies
Presentation to Management
Risk Management Decisions
Information Protection
Process Summary
References
Exercises
Screening Analysis
Introduction
Screening Analysis Methods
Summary
References
Exercises
Facility Characterization
Introduction
Undesired Events
Facility Description
Physical Details
Cyber Information System
Facility Operations
Security Protection Systems
Workforce Description
Restrictions, Requirements, Limitations
Critical Assets
Generic Fault Tree
Identifying Critical Assets
Protection Objectives
Summary
References
Exercises
Threat Analysis
Introduction
Sources of Threat Information
Local and State Sources
National Sources
Adversary Spectrum
Adversary Capability
Threat Potential for Attack
Outsider Threat
Insider Threat
Summary
References
Exercises
Consequence Analysis
Introduction
Reference Table of Consequences
Consequence Values for Undesired Events
Summary
References
Exercises
Asset Prioritization
Introduction
Prioritization Matrix
Summary
References
Exercises
System Effectiveness
Introduction
Protection System Effectiveness
Adversary Strategies
Physical Protection System Effectiveness
Cyber Protection System Effectiveness
Summary
References
Exercises
Estimating Security Risk
Introduction
Estimating Security Risk
Conditional Risk
Relative Risk
Summary
References
Exercises
Risk Reduction Strategies
Introduction
Strategies for Reducing Likelihood of Attack
Strategies for Increasing Protection System Effectiveness
Physical Protection System Upgrades
Cyber Protection System Upgrades
Protection System Upgrade Package(s)
Strategies for Mitigating Consequences
Construction Hardening
Redundancy
Optimized Recovery Strategies
Emergency Planning
Combinations of Reduction Strategies
Summary
References
Exercises
Evaluating Impacts
Risk Level
Costs
Operations/Schedules
Public Opinion
Other Site-Specific Concerns
Review Threat Analysis
Summary
References
Exercises
Risk Management Decisions
Introduction
Risk Assessment Results
Executive Summary
Introduction
Threat Analysis
Consequence Analysis
System Effectiveness Assessment
Risk Estimation
Risk Reduction Strategies and Packages
Impact Analysis
Supporting Documentation
Report Overview
Ri
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program