You are previewing Industrial Security: Managing Security in the 21st Century.
O'Reilly logo
Industrial Security: Managing Security in the 21st Century

Book Description

A comprehensive and practical guide to security organization and planning in industrial plants

  • Features Basic definitions related to plant security

  • Features Countermeasures and response methods

  • Features Facilities and equipment, and security organization

  • Topics covered are applicable to multiple types of industrial plants

  • Illustrates practical techniques for assessing and evaluating financial and corporate risks

  • Table of Contents

    1. Cover
    2. Title page
    3. Chapter 1: <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">Introduction to Security Risk Assessment and Management</i>
      1. Introduction
      2. Business Definition
      3. Security Versus Risk
      4. Framework for Risk Management
      5. Value at Risk
      6. Calculation of Risk
      7. Risk Assessment Versus Risk Management
      8. Risk Management Plans
      9. Threat Scenarios
      10. Statistics and Mathematics
      11. Pairing Vulnerability and Threat Data
      12. Setting Priorities
      13. Other Definitions of Risk Assessment
      14. Business Definition for Risk Assessment
      15. Broad Definition for Risk Assessment
      16. Quantitative Risk Assessment
      17. Qualitative Risk Assessment
      18. Countermeasures for Vulnerabilities
      19. Sample Threat Scenario NO. 1 (Fig. 1.6)
      20. Sample Threat Scenario No. 2
    4. Chapter 2: <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">Risk Assessment Basics</i>
      1. Street Calculus and Perceived Risk
      2. Security Risk Assessment Structure
      3. Value at Risk
      4. Sandia Laboratory’s Risk Assessment Analysis
      5. Annualized Cost Analysis of Risk
      6. Scenario-driven Cost Risk Analysis
      7. Model-Based Risk Analysis
      8. Risk Management by Fault Tree Methods and Risk-informed Decision management
    5. Chapter 3: <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">Assessing Types of Attacks and Threats with Data Sources</i>
      1. Weapons
      2. Muzzle Energies for Various Cartridges
      3. Rifle Grenades
      4. Rocket-Propelled Grenades and Mortars
      5. Explosive Energies
      6. Other Types of Incidents and Accidents
    6. Chapter 4: <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">Evaluating a Company&#8217;s Protective Systems</i>
      1. Surveys and Assessments
      2. Site Security Assessments
      3. Lighting
      4. Perimeter Barriers: Design Notes and Comments
      5. CCTV
      6. Windows and Doors
    7. Chapter 5: <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">Port Security</i>
      1. Ranking Threats
      2. Levels of Port Security
      3. Identification Procedures for Personnel Screening
      4. Vessel Arrival and Security Procedures While Moored
      5. Internal Security
      6. Perimeter Security and Restricted Areas
      7. Lighting
      8. Security Alarms/Video Surveillance/Communications Systems
      9. Training and Security Awareness
      10. Floating Barriers
    8. Chapter 6: <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">Basics of Cyber security</i>
      1. Communications Life Cycle
      2. Some Solutions to the Problem of Cyber crime
      3. Communications Security
      4. Communications as Transactions
      5. Telephone System Security
      6. Radio Communications
      7. Digital Communications
      8. Cyber security
      9. How to Perform the Vulnerability Assessment
      10. Communications Procedure Design: Hints and Helps
      11. Benefits: Identified
      12. Cyber Threat Matrix: Categories of Loss and Frequency
      13. Setting up Internet Security
      14. Cyber security Tools
    9. Chapter 7: <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">Scenario Planning and Analyses</i>
      1. Introduction
      2. FTA, Markov Chains, and Monte Carlo Methods
      3. Other Complimentary Techniques
      4. Sample of Initial Analysis
      5. Failure Modes and Effects Analysis
      6. DHS Analysis and Plans
      7. Bow-tie Analysis
      8. HAZOPS and Process Safety Management
      9. ALOHA, CAMEO, and Security Planning Tools
      10. The Colored Books
    10. Chapter 8: <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">Security System Design and Implementation: Practical Notes</i>
      1. Security Threat-Level Factors
      2. Considered Factors
      3. Security System Design
      4. Electronic Security Systems Design
      5. Review and Assessment of Engineering Design and Implementation
      6. Conclusion
    11. Appendix <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">I</i>: : <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">Physical Security Checklist</i>
      1. Building
      2. Lock and key, alarm systems, and guards
      3. Employee security
      4. Trash removal and shipments from the facility
      5. Planning
      6. Mail handling
      7. Fire plans
    12. Appendix <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">II</i>
      1. Cyber Security Threat/Vulnerability Assessment
      2. Cyber Security Threat/Vulnerability Assessment Scoring
    13. <i xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:svg="http://www.w3.org/2000/svg" xmlns:ibooks="http://vocabulary.itunes.apple.com/rdf/ibooks/vocabulary-extensions-1.0">Index</i>
    14. End User License Agreement