Metrics and Methods for Security Risk Management

Author: Young   Carl  

Publisher: Elsevier Science‎

Publication year: 2010

E-ISBN: 9781856179799

P-ISBN(Paperback): 9781856179782

P-ISBN(Hardback):  9781856179782

Subject: F2 Economic Planning and Management;F224-39 computer applications;TP309 安全保密

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem.

Metrics and Methods for Security Risk Management is of interest, especially since the 9/11 terror attacks, because it addresses the ways to manage risk security in the corporate world. The book aims to provide information about the fundamentals of security risks and the corresponding components, an analytical approach to risk assessments and mitigation, and quantitative methods to assess the risk components. In addition, it also discusses the physical models, principles, and quantitative methods needed to assess the risk components. The by-products of the methodology used include security standards, audits, risk metrics, and program frameworks. Security professionals, as well as scientists and engineers who are working on technical issues related to security problems will find this book relevant and useful.

  • Offers an integrated approach to assessing security risk
  • Addresses homeland security as well as IT and physical security issues
  • Describes vital safeguards for ensuring true business continuity

Chapter

Preface

Acknowledgments

Part 1: The Structure of Security Risk

Chapter 1: Security Threats and Risk

1.1. Introduction to Security Risk Or Tales Of The Psychotic Squirrel and the Sociable Shark

1.2. The Fundamental Expression of Security Risk

1.3. Introduction to Security Risk Models And Security Risk Mitigation

1.4. Summary

References

Chapter 2: The Fundamentals of Security Risk Measurements

2.1. Introduction

2.2. Linearity and Nonlinearity

2.3. Exponents, Logarithms, and Sensitivity To Change

2.4. The Exponential Function ex

2.5. The Decibel

2.6. Security Risk and the Concept of Scale

2.7. Some Common Physical Models In Security Risk

2.8. Visualizing Security Risk

2.9. An Example: Guarding Costs

2.10. Summary

Chapter 3: Security Risk Measurements And security programs

3.1. Introduction

3.2. The Security Risk Assessment Process

3.2.1 Unique threats

3.2.2 Motivating security risk mitigation: The five commandments of corporate security

3.2.3 Security risk models

3.3. Managing Security Risk

3.3.1 The security risk mitigation process

3.3.2 Security risk standards

3.4. Security Risk Audits

3.5. Security Risk Program Frameworks

3.6. Summary

Part 2: Measuring and Mitigating Security Risk

Chapter 4: Measuring the Likelihood Component Of security Risk

4.1. Introduction

4.2. Likelihood Or Potential for Risk?

4.3. Estimating the Likelihood of Randomly Occurring Security Incidents

4.4. Estimating the Potential for Biased Security Incidents

4.5. Averages and Deviations

4.6. Actuarial Approaches to Security Risk

4.7. Randomness, Loss, and Expectation Value

4.8. Financial Risk

4.9. Summary

References

Chapter 5: Measuring the Vulnerability Component of Security Risk

5.1. Introduction

5.2. Vulnerability to Information Loss Through Unauthorized Signal Detection

5.2.1. Energy, Waves, and Information*

5.2.2 Introduction to acoustic energy and audible information

5.2.3 Transmission of audible information and vulnerability to conversation-level overhears

5.2.4 Audible information and the effects of intervening structures

5.2.5 Introduction to electromagnetic energy and vulnerability to signal detection

5.2.6 Electromagnetic energy and the effects of intervening material

5.2.7 Vulnerability to information loss through unauthorized signal detection: A checklist

5.3. Vulnerability to Explosive Threats

5.3.1 Explosive parameters

5.3.2 Confidence limits and explosive vulnerability

5.4. A Theory of Vulnerability to Computer Network Infections

5.5. Biological, Chemical, and Radiological Weapons

5.5.1 Introduction

5.5.2 Vulnerability to radiological dispersion devices

5.5.3 Vulnerability to biological threats

5.5.4 Vulnerability to external contaminants; bypassing building filtration

5.5.5 Vulnerability to chemical threats

5.6. The Visual Compromise of Information

5.7. Summary

References

Chapter 6: Mitigating Security Risk: reducing vulnerability

6.1. Introduction

6.2. Audible Signals

6.2.1 Acoustic barriers

6.2.2 Sound reflection

6.2.3 Sound absorption

6.3. Electromagnetic Signals

6.3.1 Electromagnetic shielding

6.3.2 Intra-building electromagnetic signal propagation

6.3.3 Inter-building electromagnetic signal propagation

6.3.4 Non-point source electromagnetic radiation

6.4. Vehicle-borne Explosive Threats: Barriers and Bollards

6.5. Explosive Threats

6.6. Radiological Threats

6.7. Biological Threats

6.7.1 Particulate filtering

6.7.2 Ultraviolet germicidal irradiation

6.7.3 Combining UVGI and particulate filtering

6.7.4 More risk mitigation for biological threats

6.7.5 Relative effectiveness of influenza mitigation

6.8. Mitigating the Risk of Chemical Threats (Briefly Noted)

6.9. Guidelines for Reducing the Vulnerability to Non-Traditional Threats in Commercial Facilities

6.10. Commercial Technical Surveillance Countermeasures

6.10.1 Questionnaire for prospective commercial TSCM vendors

6.11. Electromagnetic Pulse Weapons

6.11.1 The EPFCG threat

6.11.2 EMP generated in proximity to unshielded facilities

6.11.3 EMP generated in proximity to shielded facilities

6.12. Summary

References

Epilogue

Appendix A: Scientific prefixes

Appendix B: Sound levels and intensities

Appendix C: The speed of sound in common materials

Appendix D: Closed circuit television (CCTV) performance criteria and technical specifications

Performance Criteria

Operational Modes

Image Data and Transmission Requirements

Camera/System Management

Image Resolution

Record Frame Rate

Image Storage

Ambient Lighting

Power and Resilience

Field of View

Information Security Restrictions

Appendix E: Physical access authorization system performance criteria

High-Level System Architecture

Physical Access Authorization

Physical Access Authorization Conditions and Signaling

Physical Access Authorization Information Transmission

Physical Access Authorization History And Reporting

Physical Access Authorization Equipment Security

Appendix F: Exterior barrier performance criteria and technical specifications

Appendix G: Window anti-blast methods technical specifications*

Appendix H: Qualitative interpretation of Rw values

Index

The users who browse this book also browse