Security Risk Assessment
eBook - ePub

Security Risk Assessment

Managing Physical and Operational Security

John M. White

  1. 230 pages
  2. English
  3. ePUB (adapté aux mobiles)
  4. Disponible sur iOS et Android
eBook - ePub

Security Risk Assessment

Managing Physical and Operational Security

John M. White

DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations

À propos de ce livre

Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization.

A good security assessment is a fact-finding process that determines an organization's state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it's used, or how to evaluate what they have found.

Security Risk Assessment offers security professionals step-by-step guidance for conducting a complete risk assessment. It provides a template draw from, giving security professionals the tools needed to conduct an assessment using the most current approaches, theories, and best practices.

  • Discusses practical and proven techniques for effectively conducting security assessments
  • Includes interview guides, checklists, and sample reports
  • Accessibly written for security professionals with different levels of experience conducting security assessments

Foire aux questions

Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier l’abonnement ». C’est aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via l’application. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă  la bibliothĂšque et Ă  toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode d’abonnement : avec l’abonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă  12 mois d’abonnement mensuel.
Qu’est-ce que Perlego ?
Nous sommes un service d’abonnement Ă  des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă  toute une bibliothĂšque pour un prix infĂ©rieur Ă  celui d’un seul livre par mois. Avec plus d’un million de livres sur plus de 1 000 sujets, nous avons ce qu’il vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Écouter sur votre prochain livre pour voir si vous pouvez l’écouter. L’outil Écouter lit le texte Ă  haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, l’accĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que Security Risk Assessment est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă  Security Risk Assessment par John M. White en format PDF et/ou ePUB ainsi qu’à d’autres livres populaires dans Business et Information Management. Nous disposons de plus d’un million d’ouvrages Ă  dĂ©couvrir dans notre catalogue.

Informations

Année
2014
ISBN
9780128009178
Chapter 1

Introduction to Security Risk Assessments

Abstract

There are many names given to the term security risk assessment. In fact, the actual process of identifying security issues has been called physical security assessment, security survey, security audit, and risk assessment to name just a few. Generally speaking, it is a systematic on-site assessment and analysis of your current security measures, whether they are physical security measures, technology, operations, facilities, security management, policies, training, reports, or any other aspect of your security program or measures. This chapter will help to define the intent of an assessment, who will conduct it, and how to remain objective and unbiased throughout the project.

Keywords

Defining security risks; Physical security review; Security deficiencies or excesses; Security risk assessment; Security vulnerabilities

What Is a Security Risk Assessment?

There are many definitions given to the term security risk assessment. According to ASIS International’s manual, Protection of Assets: Physical Security, a security risk assessment is “a fundamental examination that can include review of documentation, policies, facilities, technology, protection strategies, staffing, training, and other key indicators to determine the present state of the protection program (security) in an effort to identify deficiencies and even excesses, in order to make recommendations for improvement based on proven methods.” 1
In fact, the actual process of identifying security issues has been called many different things. Some of the more common names assigned to this subject have been security assessment, security survey, security audit, and risk assessment to name just a few. Generally speaking, it is a systematic on-site assessment and analysis of your current security measures, whether they are physical security measures, technology, operations, facilities, security management, policies, training, reports, or any other aspect of your security program or measures. Regardless of the title, they are all going after similar goals of identifying security weaknesses, risks, deficiencies, and even excesses, and then formulating a plan to address the findings with detailed recommendations based on industry accepted standards and best practices.
Most professionals would agree that how you go about the process of the assessment should be a uniformed approach. However, if there is one thing certain in life regarding such processes, it is that everyone who conducts such assessments does so in a variety of different ways.
Over the years, there have been numerous books that have covered different parts of a security assessment, so you would think that security practitioners would all be working from the same baseline. However, the opposite is true in many cases. Even among professional security consultants, all have different approaches and no two reports are the same.
Case in point—upon review of numerous security assessment reports written by independent consultants, it became clear to me that there are vast differences in style and project methodology. Some reports are nothing more than a statement of facts as determined by the author, followed by an extensive list of recommendations, most of which are not easily correlated within the report, nor are they explained in detail showing the reader what the recommendations will bring to the table if implemented. So this begs the question: if the report does not fully identify the security risk, tell the reader how to address that risk, or provide the reader with a sense of what the change will look like if implemented, what is the purpose of the assessment?
Quantitative and qualitative techniques are often used in an effort to measure and evaluate the security program’s effectiveness. The person conducting the assessment also needs to consider statistics when conducting a security risk assessment because the statistics are often the starting point in establishing a baseline of sorts for the program. You cannot effectively manage a security program if you do not track security incident reports and their outcomes. If the person doing the assessment (who will be referred to as the reviewer throughout this chapter) does not have information on historical security issues (e.g., past incident reports) to determine trends, he or she will be at a disadvantage and will likely be setting the baseline from scratch.
Another part of the security assessment is the process of identifying and defining the threat, as well as identifying what the target of those threats may be. As we often find, no two industries are exactly the same, and the process of identifying and defining security risks and threats is often different depending on your organization.
Take, for example, an organization that does research and development for high-end computer components and a retailer. The security threat for the research and development organization may be in the form of stolen trade secrets, products, or even patent infringements/violations. On the other hand, the security threats associated with the retail environment will often be theft of product or cash receipts. Therefore, in the case of a retail environment, you might be looking at implementing security measures that reduce the risk of robbery, burglary, shoplifting, or even embezzlement. As for the research and development company, security’s efforts may be more focused on preventing unauthorized access into research and development areas and unauthorized access to sensitive computer files. In both cases, security practitioners are often working in a proactive manner, which means they are trying to prevent an incident from occurring.
As most security practitioners know, security programs often operate in a proactive posture, whereas it is often the goal of security to prevent incidents from occurring. Law enforcement, on the other hand, is often operating in the reactive mode, meaning that they respond to calls for service as a situation is occurring or after it occurs. To conduct a security risk assessment is often being proactive, as you are looking at your program to see where you can improve based on industry standards. As part of that assessment, the security practitioner must look at past incidents, known threats, and potential targets, which in essence is being both proactive and reactive.
Today’s security practitioner must be flexible and must be able to not only look to the past but also plan for the future in their daily actions. The challenges of today’s security professionals are more complex than ever before. The industry in which you work has changed no matter what type of business it is. With the constant rise in workplace violence issues and threats, such as an active shooter, security professionals must adjust.
This book will only minimally touch on information technology (IT), due to the fact that most security professionals do not manage the computer systems of their companies. However, it is possible that some security practitioners are performing IT oversight to some extent, because we know there is a trend in many large corporations to bring all security systems and operations under one person, such as a chief security officer (CSO).
In most businesses, IT and security are separate, yet IT does play a role in security. IT protects the computer network systems, online presence, electronic records, and e-commerce, while the security department protects the corporate assets, which by nature of their responsibility, IT will fall under. If you are performing a security risk assessment at your organization and you are not considering your online presence or your computer network, you could be overlooking the most vulnerable portal into your organization. Although this book will address IT as it relates to the security assessment, it is not the focus and intent of this book to fully address all the security concerns associated with the corporation’s computer network. There are many resources available to fully address IT security, and we would suggest that security practitioners at a minimum have a basic understanding of their network systems.
What sets the tone for most security programs can often be described as the probability of “risks.” When you are assessing for risks you are evaluating for potential incidents of undesirable events. Real or perceived risks are those key factors that are the basis for the level of security measures instituted. In simple terms, if you do not believe that your company has any security risks, it is likely that you have minimal to no security measures other than a lock on the door.
Take, for example, a farmhouse in a very remote area. At this farmhouse, you are likely to find that the doors to the house and outbuildings are not locked, even when no one is on the property, and you may often find the car keys in the ignition. The owners believe that they have no real or perceived security risks, therefore they have no security. For them, this is a matter of choice.
On the other hand, when you look in the inner cities you will often find homeowners who go to great measures to secure their property. Those security measures will include deadbolt locks, bars on the windows, alarm systems, fencing, guard dogs, security cameras, and many other protection measures. They often do so because of the risks associated with their environment or geographic area. Either they have been a victim of a crime or someone they know has. It could also be that they have educated themselves in the risks around them and they are intent on protecting their assets. Again, it is a matter of choice, but the difference with them versus the rural homeowner is the real or perceived security risks.
When talking about businesses, you will likely never find a business, even in a very remote setting, that does not incorporate some type of security. However, not all businesses have a dedicated security professional responsible for the protection of the company’s assets. In fact, the majority of businesses have no such person on staff. Although that may be the case, there is often a member of management that does have some oversight regarding safety and security matters.
As an example, large retail businesses often have loss prevention staff in place to reduce inventory shrinkage. For the most part, those staff members may also be responsible for many of the security protocols, policies, and technology in use. However, not all retailers have such protocols or measures in place, and what they do have barely touches on “security.” In fact, if you look closely at some of the largest international retailers, you might be surprised to find that they have no security policies to speak of and their focus is only on loss prevention measures.
Some types of businesses, however, are required to have security policies and protocols in place, and healthcare is a prime example of this. Oftentimes the requirements are due to accreditation standards, yet there are also a few state laws that require security services. For example, in the state of California, healthcare facilities are required by law to conduct security risk assessments due to the high number of workplace violence incidents against healthcare staff. With that being the case, you would think that every healthcare facility had a professional security manager on staff to manage the program. However, to assume that would be incorrect. There is no requirement to have a security practitioner at the helm who takes responsibility for his or her organization’s security. In many cases, smaller hospitals have no security staff at all, or they may just have one guard working the overnight shift. In these cases, they rely solely on operational protocols and policies. They will, however, have a member of the management team who is responsible for the security oversight. This person could be the director of facilities, director of information technology, the risk manager, or the safety officer. These are just a few examples of how hospitals use staff for security oversight that are from backgrounds far removed from security. Regretfully, in most cases the people that oversee the security of the organization have no security background prior to assuming this role.

Security Risk Assessment Intent

Talk to any security practitioner who has only been in the business for a short period of time and you may soon discover that they may not understand the intent of the security risk assessment. In many cases, since they do not understand what a security risk assessment is, they certainly do not understand the need for conducting one or how to conduct one.
A familiar scenario is that of a former police officer who has changed careers and is hired to run a security program for a private company. Those who have been in law enforcement understand that police officers do not normally conduct security risk assessments, as defined at the beginning of this chapter, as part of their normal law enforcement duties. I am not implying that no police officers have any experience in this, because in fact those officers that normally work in the crime prevention bureau of the police department have some experience with this task. Also, remember that due to the nature of the law enforcement profession, the vast majority of police officers are experienced in being reactive rather than proactive. However, a law enforcement officer who changes careers and becomes a security leader will normally grasp the concept and intent of the security risk assessment due to his or her past experiences as a police officer. Their basic knowledge base will come from a crime prevention approach from their experiences on the street, and in most cases their learning curve to understand the risks faced by their employer will not be overly steep.
Therefore, when we talk about the “intent” of the security risk assessment, we are talking about what it is we are looking for, why we are looking for it, and what do we view as being a threat or risk to our organization. Of course we also need to consider what changes should be made to our security program to mitigate any risk.
A substantial part of the security risk assessment is also to determine how effective the existing security program is at the present time. We will also look to see if the intent of the security program is being fulfilled, and of course if the intent of the program is reasonable and within industry standards or expectations.
Another driving factor for conducting a security risk assessment is often a direct result of a serious security threat or incident that has happened at your organization. Many times organizations will also conduct an assessment when a serious incident has occurred at a similar business, or even at a neighboring business.
Case in point—after each mass killing or terrorist attack within the United States, there is often an internal review conducted at many organizations, many of which may have no direct relation to the business or facility where the attack occurred. Of course those organizations that had the security incident happen at their location are often responding to, and eventually preparing for, criminal or civil actions as a direct result of the incident. The unfortunate thing is that an incident has already occurred and the organization may just now be attempting to identify its security risks. In this case, the intent for the assessment is more reactive and along the lines of damage control. In addition, if the organization completed a security risk assessment in the past, it will also likely be looking at that document as part of its review.

Who Will Conduct the Assessment?

When the time comes to conduct an assessment, an organization may have someone on staff that is qualified to perform this task, or they may have to look for an outside resource to assist them. The most important consideration that an organization must understand is that the person they assign to conduct this assessment must have the proper background and training.

Internal Sources

When an organization is looking to find someone internally to conduct an assessment, they will often go with a security director or manager. However, as mentioned before, not all organizations have a security department in place, and therefore they may look to other departments such as risk management. Whomever is chosen or assigned the task of conducting the assessment must have experience in security operations and risk identification. They also need to conduct the review in an unbiased approach, which oftentimes has been identified as being one of the biggest obstacles to overcome when this assignment is conducted internally.
For an internal staff person to conduct a security risk assessment on their own program, which will involve identifying weaknesses, possible deficiencies, or even excesses...

Table des matiĂšres

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Acknowledgments
  6. About the Author
  7. Preface
  8. Chapter 1. Introduction to Security Risk Assessments
  9. Chapter 2. Preassessment Planning
  10. Chapter 3. Project Management
  11. Chapter 4. Defining the Project Scope
  12. Chapter 5. Information Gathering
  13. Chapter 6. Physical Security Assessment
  14. Chapter 7. Security Department Operations
  15. Chapter 8. Security Training
  16. Chapter 9. Workplace Violence Risks and Vulnerabilities
  17. Chapter 10. Financial Risk Assessment
  18. Chapter 11. Security Technology Assessment
  19. Chapter 12. Access Control
  20. Chapter 13. Legal Considerations and Prevention Strategies
  21. Chapter 14. Contracted Services
  22. Chapter 15. The Security Risk Assessment Report
  23. Chapter 16. Conclusion
  24. Index
Normes de citation pour Security Risk Assessment

APA 6 Citation

White, J. (2014). Security Risk Assessment ([edition unavailable]). Elsevier Science. Retrieved from https://www.perlego.com/book/1830498/security-risk-assessment-managing-physical-and-operational-security-pdf (Original work published 2014)

Chicago Citation

White, John. (2014) 2014. Security Risk Assessment. [Edition unavailable]. Elsevier Science. https://www.perlego.com/book/1830498/security-risk-assessment-managing-physical-and-operational-security-pdf.

Harvard Citation

White, J. (2014) Security Risk Assessment. [edition unavailable]. Elsevier Science. Available at: https://www.perlego.com/book/1830498/security-risk-assessment-managing-physical-and-operational-security-pdf (Accessed: 15 October 2022).

MLA 7 Citation

White, John. Security Risk Assessment. [edition unavailable]. Elsevier Science, 2014. Web. 15 Oct. 2022.