Description
Book SynopsisGuides you through analysis to implementation to provide you with know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book offers techniques for weighing and managing risks that face your organization. It gives insights into universal principles that can be adapted to specific situations and threats.
Trade Review"Managing risk in today’s rapidly changing corporate environment is challenging. James Broder and Eugene Tucker take much of the guesswork out of this challenge with Risk Analysis and the Security Survey…From cover to cover, this is a valuable resource for security professionals at all career stages." --Security Management, January 2013 "When the lst edition of this book was published, back in the 1980s, it became an instant success. Today, many years later, it stands as a classic, used by security professionals, college professors, and students around the world. This new edition addresses the problems every security executive might one day face regarding Disaster Recovery. Broder tells us how to identify and deal with these threats and vulnerabilities as well as what to do if, in spite of our best efforts, disaster strikes. This book is, without doubt, the best of its kind on the market. The contents of this book are virtually priceless and I’m so bold as to suggest that without it, a security professional’s library is incomplete." --Charles (Chuck) Sennewald, CPP, CSC "Jim Broder and Eugene Tucker have done it again--another fine reference for the serious-minded security professional." --John Fay, Learning Shop USA
Table of ContentsPart I: The Treatment and Analysis of Risk1: Risk2: Vulnerability and Threat Identification3: Risk Measurement4: Quantifying and Prioritizing Loss Potential 5: Cost/Benefit Analysis6: Other Risk Analysis Methodologies7: The Security Survey: An Overview8: Management Audit Techniques and the Preliminary Survey9: The Survey Report10: Crime Prediction11: Determining Insurance Requirements Part II: Emergency Managment and Business Continuity Planning12: Emergency Management: A Brief Introduction13: Mitigation and Preparedness14: Response Planning15: Business Impact Analysis16: Business Continuity Planning17: Plan Documentation18: Crisis Management Planning for Kidnap, Ransom, and Extortion19: Monitoring Safeguards20: The Security Consultant Appendix A: Security Survey Work SheetsAppendix B: Sample Kidnap and Ransom Contingency PlanAppendix C: Security Systems Specifications