David L. Russell, Pieter C. Arlow
Industrial Security (eBook, ePUB)
Managing Security in the 21st Century
79,99 €
79,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
79,99 €
Als Download kaufen
79,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
79,99 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
0 °P sammeln
David L. Russell, Pieter C. Arlow
Industrial Security (eBook, ePUB)
Managing Security in the 21st Century
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
A comprehensive and practical guide to security organization and planning in industrial plants * Features Basic definitions related to plant security * Features Countermeasures and response methods * Features Facilities and equipment, and security organization * Topics covered are applicable to multiple types of industrial plants * Illustrates practical techniques for assessing and evaluating financial and corporate risks
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 13.54MB
Andere Kunden interessierten sich auch für
- Tony UcedavelezRisk Centric Threat Modeling (eBook, ePUB)100,99 €
- David L. RussellIndustrial Security (eBook, PDF)79,99 €
- Dana L. StahlHealth and Safety in Emergency Management and Response (eBook, ePUB)110,99 €
- Ted G. LewisCritical Infrastructure Resilience and Sustainability Reader (eBook, ePUB)65,99 €
- Ted G. LewisCritical Infrastructure Protection in Homeland Security (eBook, ePUB)104,99 €
- Martin J. AlperenFoundations of Homeland Security (eBook, ePUB)100,99 €
- John C. PineTechnology and Emergency Management (eBook, ePUB)64,99 €
-
-
-
A comprehensive and practical guide to security organization and planning in industrial plants * Features Basic definitions related to plant security * Features Countermeasures and response methods * Features Facilities and equipment, and security organization * Topics covered are applicable to multiple types of industrial plants * Illustrates practical techniques for assessing and evaluating financial and corporate risks
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: John Wiley & Sons
- Seitenzahl: 224
- Erscheinungstermin: 16. März 2015
- Englisch
- ISBN-13: 9781119028420
- Artikelnr.: 42522539
- Verlag: John Wiley & Sons
- Seitenzahl: 224
- Erscheinungstermin: 16. März 2015
- Englisch
- ISBN-13: 9781119028420
- Artikelnr.: 42522539
David L Russell, PE is an Environmental Engineer with a background in consulting and in the Chemical Industry. He has over 40 years of experience including 9 years in the chemical industry for Hooker, IMC Chemical and Allied Chemicals. He was an instructor through the American Institute of Chemical Engineers where he taught courses in Practical Wastewater Treatment and Hazardous Materials and Hazardous Wastes. Russell has lectured on security topics to the NATO Advanced Scientific Institute, and has lectured on the responses to terrorism for the Dubai Water and Power Utility, Dubai, UAE, and taught plant security to the Security force for Saudi Aramco, and General Industries Petroleum Corporation, in Bahrain, Security Force. Lieutenant Colonel Pieter Arlow is a Senior Officer within the South African National Defense Force (SANDF), and has over 30 years of experience. He is also an instructor and Senior Security Officer, and has organized and managed many security projects. As an Officer of the SANDF, Lt.Col. Arlow has expertise in risk analysis management, risk assessment, military operations management, intelligence and counter-intelligence, terrorism and counter insurgency, force employment and operations and security management. Additionally he had been appointed as the Joint Commander for national events such as the Commonwealth Heads of Government Meetings and the World Economic Forums and has organized security for events such as the 2010 FIFA World Cup.
Chapter 1 Introduction to Security Risk Assessment and Management 1 Introduction 1 Business Definition 1 Security Versus Risk 2 Framework for Risk Management 2 Value at Risk 5 Calculation of Risk 6 Risk Assessment Versus Risk Management 6 Risk Management Plans 8 Threat Scenarios 9 Statistics and Mathematics 10 Pairing Vulnerability and Threat Data 11 Setting Priorities 13 Other Definitions of Risk Assessment 14 Business Definition for Risk Assessment 14 Broad Definition for Risk Assessment 15 Quantitative Risk Assessment 15 Qualitative Risk Assessment 15 Threats 15 Vulnerabilities 15 Countermeasures for Vulnerabilities 16 The D's of security systems 16 Sample Threat Scenario No. 1 18 Background 18 Sample Threat Scenario No. 2 23 Background 23 Chapter 2 Risk Assessment Basics 29 Street Calculus and Perceived Risk 29 Street Calculus 29 Security Risk Assessment Structure 32 Value at Risk 32 Sandia Laboratory's Risk Assessment Analysis 33 Annualized Cost Analysis of Risk 34 ScenariöDriven Cost Risk Analysis 36 Real
world example 37 Model
Based Risk Analysis 37 MBRA example case 38 Risk Management by Fault Tree Methods and Risk
Informed Decision Management 39 Fault tree analysis 39 RIDM 42 Chapter 3 Assessing Types of Attacks and Threats with Data Sources 62 Weapons 62 AK
47 62 M16 62 Sniper rifles 63 Muzzle Energies for Various Cartridges 63 Rifle Grenades 63 Rocket
Propelled Grenades and Mortars 64 Explosive Energies 65 Impact of explosives 66 Other Types of Incidents and Accidents 68 Chapter 4 Evaluating a Company's Protective Systems 70 Surveys and Assessments 70 Site Security Assessments 71 Checklists 71 Cyber security checklist 71 Lighting 72 Perimeter Barriers: Design Notes and Comments 74 CCTV 79 Windows and Doors 81 Chapter 5 Port Security 82 Ranking Threats 82 Natural threats 82 Man
made/accidental threats 82 Intentional acts-delivery vectors 83 Weapon threats 83 Levels of Port Security 83 Security response plans 84 Recommended procedures 84 Identification Procedures for Personnel Screening 85 Employees 85 Vendors/contractors/vessel pilots 85 Truck drivers/passengers 85 Visitors (all personnel not falling into other categories) 86 Government employees 86 Vessel personnel access through a facility 86 Search requirements 86 Acceptable identification 87 Access control 87 Vessel Arrival and Security Procedures While Moored 87 Internal Security 88 Vehicle control 88 Rail security 88 Key/ID/access card control 88 Computer security 89 Security rounds 89 Perimeter Security and Restricted Areas 89 Barriers 89 Fencing 89 Lighting 90 Security Alarms/Video Surveillance/Communications Systems 90 Alarms 90 Video surveillance 90 Communications systems 91 Training and Security Awareness 91 Floating Barriers 91 Chapter 6 Basics of Cyber security 93 Communications Life Cycle 93 Some Solutions to the Problem of Cyber crime 94 General recommendations 94 Communications Security 96 Communications as Transactions 96 Telephone System Security 96 Radio Communications 97 Digital Communications 97 Cyber security 98 Vulnerability assessment 98 Unknowns and alternatives 99 How to Perform the Vulnerability Assessment 99 Critical success factors 99 Optimum assessment team size 101 Communications Procedure Design: Hints and Helps 101 Benefits: Identified 102 Example 102 Cyber Threat Matrix: Categories of Loss and Frequency 103 Setting up Internet Security 104 External versus internal testing 105 Security focus 105 Browser and domain security 105 Data encryption 106 Cyber security Tools 107 Chapter 7 Scenario Planning and Analyses 109 Introduction 109 Fta, Markov Chains, and Monte Carlo Methods 110 Fuzzy fault trees 111 Markov chains and Bayesian analysis 111 Other Complimentary Techniques 112 Fishbone (Ishikawa) diagrams 112 Pareto charts 114 Sample of Initial Analysis 114 Failure Modes and Effects Analysis 119 Dhs Analysis and Plans 120 Bow
Tie Analysis 124 Example 125 Hazops and Process Safety Management 127 Process safety information: General 127 PHA and HAZOPS 128 Aloha, Cameo, and Security Planning Tools 129 The Colored Books 133 Generic Guideline for the Calculation of Risk Inherent in the Carriage of Dangerous Goods by Rail 133 The Orange Book: Management of Risk-Principles and Concepts 133 The Green Book: Methods for the Determination of Possible Damage to People and Objects Resulting from Release of Hazardous Materials, CPR
16E 135 The Yellow Book: Methods for the Calculation of Physical Effects due to the Releases of Hazardous Materials (Liquids and Gases), CPR
14E 137 The Red Book: Methods for Determining and Processing Probabilities, CPR
12 137 The Purple Book: Guidelines for Quantitative Risk Assessment, PGS 3 137 Sample outline for emergency response 141 Chapter 8 Security System Design and Implementation: Practical Notes 148 Security Threat
Level Factors 148 Considered Factors 148 Vehicle bombs 149 Standoff weapons 151 Minimum standoff distances 151 Security System Design 153 Perimeter barriers 154 Active vehicle barriers 154 Entry roadways 155 Entry control stations 156 Reinforcement of buildings and infrastructure 156 Windows 156 Security system lighting 157 Lighting system design 157 Electronic Security Systems Design 157 Alarm configurations and design 158 Access control 159 Employee screening 160 Visitor identification and control 160 Packages, personnel, and vehicle control 161 Lock and key systems 161 Security forces 162 Cargo security 162 Port security systems 163 Review and Assessment of Engineering Design and Implementation 163 Auditing and evaluation 163 Risk assessment team 164 Blank sheet approach to auditing and evaluation 165 Business approach to auditing and evaluation 165 Benchmarking 166 How to evaluate a physical security system? 167 Security systems audits 167 What to review? 168 Implementation of risk assessment 174 SQUARE: Prioritizing security requirements 177 Security monitoring and enforcement 179 Security awareness program 180 Proposed future training requirements 180 Security management 180 The differing roles of the security department 181 Stress management techniques 181 Security management techniques 184 Conclusion 186 Appendix I 187 Appendix II 196 Index 204
world example 37 Model
Based Risk Analysis 37 MBRA example case 38 Risk Management by Fault Tree Methods and Risk
Informed Decision Management 39 Fault tree analysis 39 RIDM 42 Chapter 3 Assessing Types of Attacks and Threats with Data Sources 62 Weapons 62 AK
47 62 M16 62 Sniper rifles 63 Muzzle Energies for Various Cartridges 63 Rifle Grenades 63 Rocket
Propelled Grenades and Mortars 64 Explosive Energies 65 Impact of explosives 66 Other Types of Incidents and Accidents 68 Chapter 4 Evaluating a Company's Protective Systems 70 Surveys and Assessments 70 Site Security Assessments 71 Checklists 71 Cyber security checklist 71 Lighting 72 Perimeter Barriers: Design Notes and Comments 74 CCTV 79 Windows and Doors 81 Chapter 5 Port Security 82 Ranking Threats 82 Natural threats 82 Man
made/accidental threats 82 Intentional acts-delivery vectors 83 Weapon threats 83 Levels of Port Security 83 Security response plans 84 Recommended procedures 84 Identification Procedures for Personnel Screening 85 Employees 85 Vendors/contractors/vessel pilots 85 Truck drivers/passengers 85 Visitors (all personnel not falling into other categories) 86 Government employees 86 Vessel personnel access through a facility 86 Search requirements 86 Acceptable identification 87 Access control 87 Vessel Arrival and Security Procedures While Moored 87 Internal Security 88 Vehicle control 88 Rail security 88 Key/ID/access card control 88 Computer security 89 Security rounds 89 Perimeter Security and Restricted Areas 89 Barriers 89 Fencing 89 Lighting 90 Security Alarms/Video Surveillance/Communications Systems 90 Alarms 90 Video surveillance 90 Communications systems 91 Training and Security Awareness 91 Floating Barriers 91 Chapter 6 Basics of Cyber security 93 Communications Life Cycle 93 Some Solutions to the Problem of Cyber crime 94 General recommendations 94 Communications Security 96 Communications as Transactions 96 Telephone System Security 96 Radio Communications 97 Digital Communications 97 Cyber security 98 Vulnerability assessment 98 Unknowns and alternatives 99 How to Perform the Vulnerability Assessment 99 Critical success factors 99 Optimum assessment team size 101 Communications Procedure Design: Hints and Helps 101 Benefits: Identified 102 Example 102 Cyber Threat Matrix: Categories of Loss and Frequency 103 Setting up Internet Security 104 External versus internal testing 105 Security focus 105 Browser and domain security 105 Data encryption 106 Cyber security Tools 107 Chapter 7 Scenario Planning and Analyses 109 Introduction 109 Fta, Markov Chains, and Monte Carlo Methods 110 Fuzzy fault trees 111 Markov chains and Bayesian analysis 111 Other Complimentary Techniques 112 Fishbone (Ishikawa) diagrams 112 Pareto charts 114 Sample of Initial Analysis 114 Failure Modes and Effects Analysis 119 Dhs Analysis and Plans 120 Bow
Tie Analysis 124 Example 125 Hazops and Process Safety Management 127 Process safety information: General 127 PHA and HAZOPS 128 Aloha, Cameo, and Security Planning Tools 129 The Colored Books 133 Generic Guideline for the Calculation of Risk Inherent in the Carriage of Dangerous Goods by Rail 133 The Orange Book: Management of Risk-Principles and Concepts 133 The Green Book: Methods for the Determination of Possible Damage to People and Objects Resulting from Release of Hazardous Materials, CPR
16E 135 The Yellow Book: Methods for the Calculation of Physical Effects due to the Releases of Hazardous Materials (Liquids and Gases), CPR
14E 137 The Red Book: Methods for Determining and Processing Probabilities, CPR
12 137 The Purple Book: Guidelines for Quantitative Risk Assessment, PGS 3 137 Sample outline for emergency response 141 Chapter 8 Security System Design and Implementation: Practical Notes 148 Security Threat
Level Factors 148 Considered Factors 148 Vehicle bombs 149 Standoff weapons 151 Minimum standoff distances 151 Security System Design 153 Perimeter barriers 154 Active vehicle barriers 154 Entry roadways 155 Entry control stations 156 Reinforcement of buildings and infrastructure 156 Windows 156 Security system lighting 157 Lighting system design 157 Electronic Security Systems Design 157 Alarm configurations and design 158 Access control 159 Employee screening 160 Visitor identification and control 160 Packages, personnel, and vehicle control 161 Lock and key systems 161 Security forces 162 Cargo security 162 Port security systems 163 Review and Assessment of Engineering Design and Implementation 163 Auditing and evaluation 163 Risk assessment team 164 Blank sheet approach to auditing and evaluation 165 Business approach to auditing and evaluation 165 Benchmarking 166 How to evaluate a physical security system? 167 Security systems audits 167 What to review? 168 Implementation of risk assessment 174 SQUARE: Prioritizing security requirements 177 Security monitoring and enforcement 179 Security awareness program 180 Proposed future training requirements 180 Security management 180 The differing roles of the security department 181 Stress management techniques 181 Security management techniques 184 Conclusion 186 Appendix I 187 Appendix II 196 Index 204
Chapter 1 Introduction to Security Risk Assessment and Management 1 Introduction 1 Business Definition 1 Security Versus Risk 2 Framework for Risk Management 2 Value at Risk 5 Calculation of Risk 6 Risk Assessment Versus Risk Management 6 Risk Management Plans 8 Threat Scenarios 9 Statistics and Mathematics 10 Pairing Vulnerability and Threat Data 11 Setting Priorities 13 Other Definitions of Risk Assessment 14 Business Definition for Risk Assessment 14 Broad Definition for Risk Assessment 15 Quantitative Risk Assessment 15 Qualitative Risk Assessment 15 Threats 15 Vulnerabilities 15 Countermeasures for Vulnerabilities 16 The D's of security systems 16 Sample Threat Scenario No. 1 18 Background 18 Sample Threat Scenario No. 2 23 Background 23 Chapter 2 Risk Assessment Basics 29 Street Calculus and Perceived Risk 29 Street Calculus 29 Security Risk Assessment Structure 32 Value at Risk 32 Sandia Laboratory's Risk Assessment Analysis 33 Annualized Cost Analysis of Risk 34 ScenariöDriven Cost Risk Analysis 36 Real
world example 37 Model
Based Risk Analysis 37 MBRA example case 38 Risk Management by Fault Tree Methods and Risk
Informed Decision Management 39 Fault tree analysis 39 RIDM 42 Chapter 3 Assessing Types of Attacks and Threats with Data Sources 62 Weapons 62 AK
47 62 M16 62 Sniper rifles 63 Muzzle Energies for Various Cartridges 63 Rifle Grenades 63 Rocket
Propelled Grenades and Mortars 64 Explosive Energies 65 Impact of explosives 66 Other Types of Incidents and Accidents 68 Chapter 4 Evaluating a Company's Protective Systems 70 Surveys and Assessments 70 Site Security Assessments 71 Checklists 71 Cyber security checklist 71 Lighting 72 Perimeter Barriers: Design Notes and Comments 74 CCTV 79 Windows and Doors 81 Chapter 5 Port Security 82 Ranking Threats 82 Natural threats 82 Man
made/accidental threats 82 Intentional acts-delivery vectors 83 Weapon threats 83 Levels of Port Security 83 Security response plans 84 Recommended procedures 84 Identification Procedures for Personnel Screening 85 Employees 85 Vendors/contractors/vessel pilots 85 Truck drivers/passengers 85 Visitors (all personnel not falling into other categories) 86 Government employees 86 Vessel personnel access through a facility 86 Search requirements 86 Acceptable identification 87 Access control 87 Vessel Arrival and Security Procedures While Moored 87 Internal Security 88 Vehicle control 88 Rail security 88 Key/ID/access card control 88 Computer security 89 Security rounds 89 Perimeter Security and Restricted Areas 89 Barriers 89 Fencing 89 Lighting 90 Security Alarms/Video Surveillance/Communications Systems 90 Alarms 90 Video surveillance 90 Communications systems 91 Training and Security Awareness 91 Floating Barriers 91 Chapter 6 Basics of Cyber security 93 Communications Life Cycle 93 Some Solutions to the Problem of Cyber crime 94 General recommendations 94 Communications Security 96 Communications as Transactions 96 Telephone System Security 96 Radio Communications 97 Digital Communications 97 Cyber security 98 Vulnerability assessment 98 Unknowns and alternatives 99 How to Perform the Vulnerability Assessment 99 Critical success factors 99 Optimum assessment team size 101 Communications Procedure Design: Hints and Helps 101 Benefits: Identified 102 Example 102 Cyber Threat Matrix: Categories of Loss and Frequency 103 Setting up Internet Security 104 External versus internal testing 105 Security focus 105 Browser and domain security 105 Data encryption 106 Cyber security Tools 107 Chapter 7 Scenario Planning and Analyses 109 Introduction 109 Fta, Markov Chains, and Monte Carlo Methods 110 Fuzzy fault trees 111 Markov chains and Bayesian analysis 111 Other Complimentary Techniques 112 Fishbone (Ishikawa) diagrams 112 Pareto charts 114 Sample of Initial Analysis 114 Failure Modes and Effects Analysis 119 Dhs Analysis and Plans 120 Bow
Tie Analysis 124 Example 125 Hazops and Process Safety Management 127 Process safety information: General 127 PHA and HAZOPS 128 Aloha, Cameo, and Security Planning Tools 129 The Colored Books 133 Generic Guideline for the Calculation of Risk Inherent in the Carriage of Dangerous Goods by Rail 133 The Orange Book: Management of Risk-Principles and Concepts 133 The Green Book: Methods for the Determination of Possible Damage to People and Objects Resulting from Release of Hazardous Materials, CPR
16E 135 The Yellow Book: Methods for the Calculation of Physical Effects due to the Releases of Hazardous Materials (Liquids and Gases), CPR
14E 137 The Red Book: Methods for Determining and Processing Probabilities, CPR
12 137 The Purple Book: Guidelines for Quantitative Risk Assessment, PGS 3 137 Sample outline for emergency response 141 Chapter 8 Security System Design and Implementation: Practical Notes 148 Security Threat
Level Factors 148 Considered Factors 148 Vehicle bombs 149 Standoff weapons 151 Minimum standoff distances 151 Security System Design 153 Perimeter barriers 154 Active vehicle barriers 154 Entry roadways 155 Entry control stations 156 Reinforcement of buildings and infrastructure 156 Windows 156 Security system lighting 157 Lighting system design 157 Electronic Security Systems Design 157 Alarm configurations and design 158 Access control 159 Employee screening 160 Visitor identification and control 160 Packages, personnel, and vehicle control 161 Lock and key systems 161 Security forces 162 Cargo security 162 Port security systems 163 Review and Assessment of Engineering Design and Implementation 163 Auditing and evaluation 163 Risk assessment team 164 Blank sheet approach to auditing and evaluation 165 Business approach to auditing and evaluation 165 Benchmarking 166 How to evaluate a physical security system? 167 Security systems audits 167 What to review? 168 Implementation of risk assessment 174 SQUARE: Prioritizing security requirements 177 Security monitoring and enforcement 179 Security awareness program 180 Proposed future training requirements 180 Security management 180 The differing roles of the security department 181 Stress management techniques 181 Security management techniques 184 Conclusion 186 Appendix I 187 Appendix II 196 Index 204
world example 37 Model
Based Risk Analysis 37 MBRA example case 38 Risk Management by Fault Tree Methods and Risk
Informed Decision Management 39 Fault tree analysis 39 RIDM 42 Chapter 3 Assessing Types of Attacks and Threats with Data Sources 62 Weapons 62 AK
47 62 M16 62 Sniper rifles 63 Muzzle Energies for Various Cartridges 63 Rifle Grenades 63 Rocket
Propelled Grenades and Mortars 64 Explosive Energies 65 Impact of explosives 66 Other Types of Incidents and Accidents 68 Chapter 4 Evaluating a Company's Protective Systems 70 Surveys and Assessments 70 Site Security Assessments 71 Checklists 71 Cyber security checklist 71 Lighting 72 Perimeter Barriers: Design Notes and Comments 74 CCTV 79 Windows and Doors 81 Chapter 5 Port Security 82 Ranking Threats 82 Natural threats 82 Man
made/accidental threats 82 Intentional acts-delivery vectors 83 Weapon threats 83 Levels of Port Security 83 Security response plans 84 Recommended procedures 84 Identification Procedures for Personnel Screening 85 Employees 85 Vendors/contractors/vessel pilots 85 Truck drivers/passengers 85 Visitors (all personnel not falling into other categories) 86 Government employees 86 Vessel personnel access through a facility 86 Search requirements 86 Acceptable identification 87 Access control 87 Vessel Arrival and Security Procedures While Moored 87 Internal Security 88 Vehicle control 88 Rail security 88 Key/ID/access card control 88 Computer security 89 Security rounds 89 Perimeter Security and Restricted Areas 89 Barriers 89 Fencing 89 Lighting 90 Security Alarms/Video Surveillance/Communications Systems 90 Alarms 90 Video surveillance 90 Communications systems 91 Training and Security Awareness 91 Floating Barriers 91 Chapter 6 Basics of Cyber security 93 Communications Life Cycle 93 Some Solutions to the Problem of Cyber crime 94 General recommendations 94 Communications Security 96 Communications as Transactions 96 Telephone System Security 96 Radio Communications 97 Digital Communications 97 Cyber security 98 Vulnerability assessment 98 Unknowns and alternatives 99 How to Perform the Vulnerability Assessment 99 Critical success factors 99 Optimum assessment team size 101 Communications Procedure Design: Hints and Helps 101 Benefits: Identified 102 Example 102 Cyber Threat Matrix: Categories of Loss and Frequency 103 Setting up Internet Security 104 External versus internal testing 105 Security focus 105 Browser and domain security 105 Data encryption 106 Cyber security Tools 107 Chapter 7 Scenario Planning and Analyses 109 Introduction 109 Fta, Markov Chains, and Monte Carlo Methods 110 Fuzzy fault trees 111 Markov chains and Bayesian analysis 111 Other Complimentary Techniques 112 Fishbone (Ishikawa) diagrams 112 Pareto charts 114 Sample of Initial Analysis 114 Failure Modes and Effects Analysis 119 Dhs Analysis and Plans 120 Bow
Tie Analysis 124 Example 125 Hazops and Process Safety Management 127 Process safety information: General 127 PHA and HAZOPS 128 Aloha, Cameo, and Security Planning Tools 129 The Colored Books 133 Generic Guideline for the Calculation of Risk Inherent in the Carriage of Dangerous Goods by Rail 133 The Orange Book: Management of Risk-Principles and Concepts 133 The Green Book: Methods for the Determination of Possible Damage to People and Objects Resulting from Release of Hazardous Materials, CPR
16E 135 The Yellow Book: Methods for the Calculation of Physical Effects due to the Releases of Hazardous Materials (Liquids and Gases), CPR
14E 137 The Red Book: Methods for Determining and Processing Probabilities, CPR
12 137 The Purple Book: Guidelines for Quantitative Risk Assessment, PGS 3 137 Sample outline for emergency response 141 Chapter 8 Security System Design and Implementation: Practical Notes 148 Security Threat
Level Factors 148 Considered Factors 148 Vehicle bombs 149 Standoff weapons 151 Minimum standoff distances 151 Security System Design 153 Perimeter barriers 154 Active vehicle barriers 154 Entry roadways 155 Entry control stations 156 Reinforcement of buildings and infrastructure 156 Windows 156 Security system lighting 157 Lighting system design 157 Electronic Security Systems Design 157 Alarm configurations and design 158 Access control 159 Employee screening 160 Visitor identification and control 160 Packages, personnel, and vehicle control 161 Lock and key systems 161 Security forces 162 Cargo security 162 Port security systems 163 Review and Assessment of Engineering Design and Implementation 163 Auditing and evaluation 163 Risk assessment team 164 Blank sheet approach to auditing and evaluation 165 Business approach to auditing and evaluation 165 Benchmarking 166 How to evaluate a physical security system? 167 Security systems audits 167 What to review? 168 Implementation of risk assessment 174 SQUARE: Prioritizing security requirements 177 Security monitoring and enforcement 179 Security awareness program 180 Proposed future training requirements 180 Security management 180 The differing roles of the security department 181 Stress management techniques 181 Security management techniques 184 Conclusion 186 Appendix I 187 Appendix II 196 Index 204