Asset Protection and Security Management Handbook: 1st Edition (Hardback) book cover

Asset Protection and Security Management Handbook

1st Edition

Edited by James Walsh

Auerbach Publications

584 pages | 57 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9780849316036
pub: 2002-12-27
$145.00
x
eBook (VitalSource) : 9780429247552
pub: 2002-12-27
from $72.50


FREE Standard Shipping!

Description

The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.

Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management.

Reviews

"Overall an excellent book, a lot of valuable information…I would give the book 9 out of a possible 10 stars … Well organized and well written, the ideas and concepts flow in a methodical and progressive manner. … for those who have an interest in the subject matter, the book is a pleasure to read. …Excellent and well-documented references… it is clear that the author[s] did [their] homework… The appendices at the end of the chapters are quite valuable and have a lot of helpful secondary information. … All of the information is germane and relevant. … the writer[s] really know what they are talking about."

-Ben Rothke, CISSP, Senior Security Architect, QinetiQ Trusted Information Management, Inc.

Table of Contents

INTRODUCTION TO ASSETS PROTECTION

The Management Function

Definition of Assets Protection

Basic Considerations

The Systems Approach

Countermeasures

The System Test

Appendix A: Self-Inspection and Protection of Assets Check Sheet

SECURITY VULNERABILITY

Introduction

Defining the Problem

Loss Event Profile

Loss Event Probability or Frequency

Loss Event Criticality

Alternative Approaches to Criticality

Preparing A Solution

Network Design

Solving the Problem

Economic Justification of Security

Appendix A: Basic Security Survey

Appendix B: Basic Matrix

STRUCTURAL BARRIERS

Introduction

Barrier Categories

Building Surfaces

Evaluation of Building Surfaces

Building Openings

Bomb Protection

Vehicle Barriers

GENERAL LOCKING CONCEPTS

Introduction

Basic Lock Grouping

Master Keying Mechanical Locks

Security Vulnerabilities of Mechanical Locks

Electrified Locking Mechanisms

ALARM SENSORS

Sensor Applications

Security Applications

Categories of Sensors

Sensors for Fire Detection

Appendix A: Federal Specification

Components for Interior Alarm Systems

SYSTEMS CONSIDERATIONS

Introduction

Alarm Termination

Systems Design

Cost Reduction and Protection Improvement

The Automated Security System

Emergency Power

Appendix A: Glossary of Frequently Used Security Terms

Appendix B: Glossary of Frequently Used Fire Terms

ACCESS CONTROL

Basic Access Control Objectives

Granting/Denying Entry

Authorized Access Control

Coded Card Technology

Distributed Intelligence Systems

Special Access Features and Applications

Weapons and Contraband Screening

EMERGENCY PLANNING

The First Step

Advance Planning

Planning Issues and Considerations

After the Plan Is Written

Appendix A: Company Disaster Control Program

Appendix B: Resources and Logistics Equipment and Services

INFORMATION SYSTEMS SECURITY: AN OVERVIEW

Introduction

Encoding Digital Data

Processing Digital Data

A Typical Central Processing Unit

The Impact of Large-Scale Integration

A Typical Information System

Classes of Computers

The Evolution of Information Systems

What is Information Systems Security?

Is Information Systems Security Important?

The Evolution of Information System Risks

Management of Information Systems Security

Functional Definition of Information Systems Security

INFORMATION SYSTEMS SECURITY

Introduction

Roles and Responsibilities

Information Systems Security Policies, Procedures and

Information Systems Security Program Management

Information Systems Security and Planning

Operating and User Controls

Audit Trails and Transaction Logs

The Internet

INVESTIGATIONS: GENERAL COMMENTS

Public- and Private-Sector Investigations

Investigations - In General

Qualities of an Effective Investigation

Legal Guidelines

Investigative Reports

Appendix A: Selected Internet Investigative Resources

SECURITY AND PROTECTIVE LIGHTING

Introduction

Lighting and Lighting Definitions

Lighting Systems

Lighting Economics

Starting and Re-Strike

Security Lighting Applications

Security Lighting and Closed Circuit Video Systems

Standards for Security Lighting Levels

CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN

Introduction

Understanding CPTED: Theory, History, and Practice

Basic Crime Prevention Assumptions

Contemporary Thinking on Crime and Criminals

CONCEPTS OF RISK MANAGEMENT

Reducing Crime through Physical Design

Site Development and Security Zoning

Security Design Criteria for Parking Facilities

Design Considerations for Industrial Buildings

Design Considerations for Office Buildings

Special Considerations Regarding U.S. Federal Buildings

Graphics and Signage for Crime Prevention and Environmental Security

Summary

UNITED STATES CRIMINAL LAW

Introduction

Federal and State Constitutions

Statutory Law

Definition and Classification of Crimes

Case or Decisional Law

Relevance to Asset Protection

Important Procedural Considerations

Deception Detection Instruments

Conclusion

THE CIVIL LAW

Definition

Major Branches

Statutory Law

Civil Common Law

Torts In General

The Area of Civil Rights

SECURITY AS A MANAGEMENT FUNCTION

Introduction

Developing the Organization

Program Implementation

Communications

Staffing the Protection Organization

Program Management

ETHICS IN THE SECURITY PROFESSION

Introduction

What Are Professional Ethics?

The Security Profession

The Professional Society

The Code of Ethics of the American Society for Industrial

Security

The Practical Application of Professional Ethics

Selected Bibliography

DETECTING DECEPTION IN INTERVIEWS AND INTERROGATIONS

Introduction

Different Types of Responses

Some Preliminary Cautions

Verbal Responses

Nonverbal Responses

The Behavior Analysis Interview

The Reid Nine Steps of Interrogation

A PLAN FOR THREAT MANAGEMENT

Overview

The Concept of Threat Management

Liability and Legal Considerations

The Psychological Dynamic of Workplace Violence

Pre-Employment Screening

Physical Security

Policy Statement and Reporting Procedure

The Incident Management Team (IMT) and Supporting

Resources

The Incident Management Process

Assessment Phase

Appendix A: Model Policy for Workplace Threats and Violence

Appendix B: Minimum Qualifications for Outside Consulting Team Members

Appendix C: Normal Incident Assessment/Resolution Process

INDEX

Subject Categories

BISAC Subject Codes/Headings:
BUS073000
BUSINESS & ECONOMICS / Commerce
COM053000
COMPUTERS / Security / General
LAW041000
LAW / Forensic Science