U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Development and Application of a Threat Matrix for Integrated Security System Design (From Carnahan Conference on Security Technology, 1989: Crime Countermeasures, P 67-70, 1989, R. William De Vore, ed. -- See NCJ-117867)

NCJ Number
117880
Author(s)
H F Daidone
Date Published
1989
Length
4 pages
Annotation
Using a logical methodology to tailor a security system to an organization's needs is the approach recommended for successfully designing a security system.
Abstract
The needs can be determined by the use of accurate threat and vulnerability analyses. Factors affecting threats are the geographic location, the environment surrounding the facility, the proximity to population centers, the sensitivity of the data, the importance of the target, the opportunities for attack, and the security awareness of the organization. The vulnerability analysis should address four categories of vulnerability: administrative, physical, technical, and personnel. This analysis should also include a review and revalidation of security and safety policies and procedures as well as their basic assumptions. The information from these analyses should be processed using the threat matrix approach to develop an integrated security system designed to be effective at the specific site. Figures. (Author abstract modified)

Downloads

No download available

Availability