Vulnerability Assessment of Physical Protection Systems

Author: Garcia   Mary Lynn  

Publisher: Elsevier Science‎

Publication year: 2005

E-ISBN: 9780080481678

P-ISBN(Paperback): 9780750677882

P-ISBN(Hardback):  9780750677882

Subject: D917 犯罪学;F2 Economic Planning and Management

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach. The book describes the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. It draws heavily on the principles introduced in the author’s best-selling Design and Evaluation of Physical Protection Systems and allows readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources.

The text covers the full spectrum of a VA, including negotiating tasks with the customer; project management and planning of the VA; team membership; and step-by-step details for performing the VA, data collection and analysis. It also provides important notes on how to use the VA to suggest design improvements and generate multiple design options. The text ends with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools are introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact.

This book will be of interest to physical s

Chapter

CHAPTER 2 Physical Protection Systems Principles and Concepts

CHAPTER 3 Getting Started

CHAPTER 4 VA Process Inputs - Establish Protection Objectives

CHAPTER 5 Data Collection - Intrusion Detection Subsystem

CHAPTER 6 Data Collection - Alarm Assessment Subsystem

CHAPTER 7 Data Collection - Entry Control Subsystem

CHAPTER 8 Data Collection - Alarm Communication and Display Subsystem

CHAPTER 9 Data Collection - Delay Subsystem

CHAPTER 10 Data Collection - Response Subsystem

CHAPTER 11 Analysis

CHAPTER 12 Reporting and Using Results

APPENDIX A Project Management Forms and Templates

APPENDIX B Initial Briefing Template

APPENDIX C Threat and Facility Worksheets

APPENDIX D Data Collection Sheets

APPENDIX E Alarm Communication and Display Subsystem Criteria

APPENDIX F Representative Delays

APPENDIX G Results Briefing Template

Index

The users who browse this book also browse


No browse record.