U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Risk Analysis and the Security Survey

NCJ Number
93429
Author(s)
J F Broder
Date Published
1984
Length
238 pages
Annotation
Intended to assist the working security practitioner and student in conducting security surveys and audits, this book focuses on the general areas of analytical concepts, survey techniques, insurance requirements, and program development and operational activities.
Abstract
Chapters dealing with analytical concepts focus on risk analysis, the identification of vulnerabilities and threats, risk measurement and quantification, how to quantify and prioritize loss potential, and conducting a cost/benefit ratio analysis. The discussion of risk analysis considers the nature of risk and risk analysis, what risk analysis can do for management, the role of management in risk analysis, the risk exposure assessment. Consideration of the identification of vulnerabilities and threats addresses risk identification, examples of the problems of identification, and the security checklist. The portrayal of risk measurement and quantification encompasses cost valuation and frequency occurrence; principles of probability; probability, risk, and security; and estimating frequency of occurrence probability. Aspects of quantifying and prioritizing loss potential are covered under the topics of assessing criticality or severity and the decision matrix. Advice on conducting a cost/benefit ratio analysis deals with system design engineering (cost, reliability, and delays), building redundancy into the system, and a security countermeasure plan. Chapters dealing with security survey techniques discuss the rationale for and the benefits of the security survey, management audit and the preliminary survey, and the survey report. Other chapters examine insurance requirements and contingency planning, crisis management planning, monitoring safeguards, and the security consultant. The appendixes contain security survey work sheets; a fire prevention survey; a building emergency management plan; danger signs of fraud, embezzlement, and theft; electronics security system specification; a blanket crime coverage insurance proposal; and a sample kidnap and ramsom contingency plan. Exhibits, footnotes, and a subject index are provided.

Downloads

No download available

Availability