O'Reilly logo

Metrics and Methods for Security Risk Management by Carl Young

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Security risk measurements and security programs
Risk … risk is our business. That's what this starship is all about. That's why we're aboard her. — Captain James T. Kirk
“Return to Tomorrow,” Star Trek, Stardate 4768.3
3.1. Introduction
The breadth of threats in the modern world of security can seem daunting. On a high level, these range from the relatively mundane like “theft” to the more esoteric variety such as chemical, biological, and radiological weapons. If one considers all the variations of each threat, in addition to differences associated with venue, facility type, etc., there are potentially an infinite number of threat scenarios. What are the implications of this to a modern security program, and more specifically, how do ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required