Security risk management body of knowledge
著者
書誌事項
Security risk management body of knowledge
(Wiley series in systems engineering)
John Wiley & Sons, c2009
大学図書館所蔵 全1件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes bibliographical references (p. 419-425) and index
内容説明・目次
内容説明
A framework for formalizing risk management thinking in today?s complex business environment Security Risk Management Body of Knowledge details the security risk management process in a format that can easily be applied by executive managers and security risk management practitioners. Integrating knowledge, competencies, methodologies, and applications, it demonstrates how to document and incorporate best-practice concepts from a range of complementary disciplines.
Developed to align with International Standards for Risk Management such as ISO 31000 it enables professionals to apply security risk management (SRM) principles to specific areas of practice. Guidelines are provided for: Access Management; Business Continuity and Resilience; Command, Control, and Communications; Consequence Management and Business Continuity Management; Counter-Terrorism; Crime Prevention through Environmental Design; Crisis Management; Environmental Security; Events and Mass Gatherings; Executive Protection; Explosives and Bomb Threats; Home-Based Work; Human Rights and Security; Implementing Security Risk Management; Intellectual Property Protection; Intelligence Approach to SRM; Investigations and Root Cause Analysis; Maritime Security and Piracy; Mass Transport Security; Organizational Structure; Pandemics; Personal Protective Practices; Psych-ology of Security; Red Teaming and Scenario Modeling; Resilience and Critical Infrastructure Protection; Asset-, Function-, Project-, and Enterprise-Based Security Risk Assessment; Security Specifications and Postures; Security Training; Supply Chain Security; Transnational Security; and Travel Security.
目次
PREFACE xiii ACKNOWLEDGMENTS xv
ABOUT SRMBOK xvii
1 INTRODUCTION AND OVERVIEW 1
1.1 Why SRMBOK? 1
1.2 Where Do We Go from Here? 3
1.3 What is Security Risk Management? 4
1.4 How does SRM Relate to Risk Management? 11
1.5 Conclusion, 14
2 SECURITY RISK MANAGEMENT CONTEXT 15
2.1 The Changing Security Environment, 15
2.2 Changing Concepts in Security Risk Management, 16
2.3 Origins of Security and Risk Management, 18
2.4 Trends and Future Directions, 18
2.5 Globalization, Opportunity, and Volatility, 19
2.6 Transnational and Extrajurisdictional Risks, 20
2.7 Law, Regulatory Framework, and Ramifications for Management, 21
2.8 Diversification or Concentration? 22
2.9 Political Awareness, 23
2.10 Risk versus Reward, 24
2.11 Summary of Key Points, 24
3 SECURITY GOVERNANCE 27
3.1 Introduction, 27
3.2 What Is Security Governance? 28
3.3 Duty of Care, 28
3.4 Resilience, 30
3.5 Security Culture, 37
3.6 Governance Frameworks, 38
3.7 Incident Management and Reporting, 41
3.8 Summary of Key Points, 42
4 SRMBOK FRAMEWORK 43
4.1 SRMBOK Guiding Principles, 46
5 PRACTICE AREAS 53
5.1 Introduction, 53
5.2 Security Management, 56
5.3 Physical Security, 59
5.4 People Security, 63
5.5 ICT Security, 77
5.6 Information Security, 81
6 STRATEGIC KNOWLEDGE AREAS 97
6.1 Introduction, 97
6.2 Exposure, 105
6.3 Risk, 130
6.4 Resources, 166
6.5 Quality, 172
7 OPERATIONAL COMPETENCY AREAS 195
7.1 Business Integration, 195
7.2 Functional Design, 202
7.3 Implementation Management, 204
7.4 Assurance and Audit, 211
8 ACTIVITY AREAS 219
8.1 Introduction, 219
8.2 Intelligence, 224
8.3 Protective Security, 230
8.4 Response, 231
8.5 Recovery and Continuity, 242
8.6 Summary of Key Points, 253
9 SECURITY RISK MANAGEMENT ENABLERS 255
9.1 Introduction, 255
9.2 Summary of Key Points, 259
10 ASSET AREAS 261
10.1 What Is an Asset? 261
10.2 Key Asset Groups, 264
11 SRM INTEGRATION 269
11.1 SRM Integration with Enterprise Risk Management, 273
11.2 ERM Frameworks, 274
11.3 Implementing an Integrated ERM Program, 276
11.4 Summary of Key Points, 282
12 SRM LEXICON 285
12.1 Introduction, 285
12.2 Illustrations, 286
12.3 Notes to Readers, 289
12.4 Definitions, 290
13 SAMPLE TEMPLATES 339
13.1 Security Risk Register form (Example 1), 340
13.2 Security Risk Register form (Example 2), 340
13.3 Risk Treatment Schedule (Example 1), 341
13.4 Risk Treatment Schedule (Example 2), 341
13.5 Outline Security Plan, 342
13.6 Day-to-Day Operational Governance Registers, 343
13.7 Property Selection and Security Planning Checklist, 349
13.8 Sample Commitment Statement to Security and Risk Management, 361
13.9 Sample Bomb Threat Checklist, 362
13.10 Sample Bomb Threat Room Search Checklist, 364
13.11 Evaluation Criteria for Business Continuity and Organizational Resilience, 365
14 ABOUT THE LEAD AUTHORS 417
14.1 Julian Talbot, CPP, 417
14.2 Dr Miles Jakeman, 418
BIBLIOGRAPHY AND OTHER REFERENCES 419
INDEX 427
「Nielsen BookData」 より