Physical Security Strategy and Process Playbook
()
About this ebook
The Physical Security Strategy and Process Playbook is a concise yet comprehensive treatment of physical security management in the business context. It can be used as an educational tool, help a security manager define security requirements, and serve as a reference for future planning.
This book is organized into six component parts around the central theme that physical security is part of sound business management. These components include an introduction to and explanation of basic physical security concepts; a description of the probable security risks for more than 40 functional areas in business; security performance guidelines along with a variety of supporting mitigation strategies; performance specifications for each of the recommended mitigation strategies; guidance on selecting, implementing, and evaluating a security system; and lists of available physical security resources.
The Physical Security Strategy and Process Playbook is an essential resource for anyone who makes security-related decisions within an organization, and can be used as an instructional guide for corporate training or in the classroom.
The Physical Security Strategy and Process Playbook is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
- Chapters are categorized by issues and cover the fundamental concepts of physical security up to high-level program procedures
- Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance to be achieved
- Discusses the typical security risks that occur in more than 40 functional areas of an organization, along with security performance guidelines and specifications for each
- Covers the selection, implementation, and evaluation of a robust security system
Related to Physical Security Strategy and Process Playbook
Related ebooks
Physical Security Professional A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Success: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsFacility Security Principles for Non-Security Practitioners Rating: 0 out of 5 stars0 ratingsWorkplace Security Playbook: The New Manager's Guide to Security Risk Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Effective Management: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsMeasures and Metrics in Corporate Security Rating: 0 out of 5 stars0 ratingsBusiness Continuity: Playbook Rating: 0 out of 5 stars0 ratingsSecurity and Risk Management: CISSP, #1 Rating: 5 out of 5 stars5/5Effective Physical Security Implementation A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsNine Practices of the Successful Security Leader: Research Report Rating: 0 out of 5 stars0 ratingsCyber Security Policy A Complete Guide - 2020 Edition Rating: 5 out of 5 stars5/5Application Security in the ISO27001 Environment Rating: 0 out of 5 stars0 ratingsInformation Protection Playbook Rating: 0 out of 5 stars0 ratingsBusiness Practical Security Rating: 0 out of 5 stars0 ratingsSecurity Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Cyber Security Awareness A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSecurity Metrics A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsEffective Physical Security Rating: 3 out of 5 stars3/5Physical Security: 150 Things You Should Know Rating: 0 out of 5 stars0 ratingsPhysical Security Systems Handbook: The Design and Implementation of Electronic Security Systems Rating: 5 out of 5 stars5/5150 Things You Should Know about Security Rating: 5 out of 5 stars5/5Workplace Security Essentials: A Guide for Helping Organizations Create Safe Work Environments Rating: 0 out of 5 stars0 ratingsEffective Security Management Rating: 0 out of 5 stars0 ratingsIntroduction to Security Rating: 2 out of 5 stars2/5Security Supervision and Management: Theory and Practice of Asset Protection Rating: 4 out of 5 stars4/5Security Risk Assessment: Managing Physical and Operational Security Rating: 5 out of 5 stars5/5Corporate Security Management: Challenges, Risks, and Strategies Rating: 5 out of 5 stars5/5The Manager's Handbook for Business Security Rating: 0 out of 5 stars0 ratingsPhysical Security Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsRisk Analysis and the Security Survey Rating: 4 out of 5 stars4/5
Business For You
The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5Financial Words You Should Know: Over 1,000 Essential Investment, Accounting, Real Estate, and Tax Words Rating: 4 out of 5 stars4/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5Robert's Rules Of Order Rating: 5 out of 5 stars5/5The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Emotional Intelligence: Exploring the Most Powerful Intelligence Ever Discovered Rating: 5 out of 5 stars5/5How To Pay Off Your Mortgage in 5 Years Rating: 5 out of 5 stars5/5Tools Of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers Rating: 4 out of 5 stars4/5Crucial Conversations: Tools for Talking When Stakes are High, Third Edition Rating: 4 out of 5 stars4/5Just Listen: Discover the Secret to Getting Through to Absolutely Anyone Rating: 4 out of 5 stars4/5Carol Dweck's Mindset The New Psychology of Success: Summary and Analysis Rating: 4 out of 5 stars4/5Crucial Conversations Tools for Talking When Stakes Are High, Second Edition Rating: 4 out of 5 stars4/5The Everything Guide To Being A Paralegal: Winning Secrets to a Successful Career! Rating: 5 out of 5 stars5/5Leadership and Self-Deception: Getting out of the Box Rating: 4 out of 5 stars4/5The Five Dysfunctions of a Team: A Leadership Fable, 20th Anniversary Edition Rating: 4 out of 5 stars4/5Collaborating with the Enemy: How to Work with People You Don’t Agree with or Like or Trust Rating: 4 out of 5 stars4/5Company Rules: Or Everything I Know About Business I Learned from the CIA Rating: 4 out of 5 stars4/5Buy, Rehab, Rent, Refinance, Repeat: The BRRRR Rental Property Investment Strategy Made Simple Rating: 5 out of 5 stars5/5Set for Life: An All-Out Approach to Early Financial Freedom Rating: 4 out of 5 stars4/5Confessions of an Economic Hit Man, 3rd Edition Rating: 5 out of 5 stars5/5Law of Connection: Lesson 10 from The 21 Irrefutable Laws of Leadership Rating: 4 out of 5 stars4/5Capitalism and Freedom Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5
Reviews for Physical Security Strategy and Process Playbook
0 ratings0 reviews
Book preview
Physical Security Strategy and Process Playbook - John Kingsley-Hefty
1
Physical Security Concepts
In Chapter 1: Physical Security Concepts, we are introduced to three fundamental concepts of physical security, which include assessing the security risks to your business; zones of protection; and the components of a security system: barriers, technology, procedures, and people. An overall assessment of the security issues relating to your business operations—your people, information, property, product, and the corporation’s reputation—is necessary to identify the security needs of your business. When conducting this assessment, the author explains that the three elements of security should be applied: probability, criticality, and vulnerability. With these concepts in mind, the chapter continues with instructions on how to conduct the security assessment and arrive at a determination of your organization’s security risks. It also discusses the components of a security system and the way to integrate the system with existing business processes.
Keywords
Security goals; security assessment; zones of protection; probability; criticality; vulnerability; risk; access control; performance guidelines; physical barriers; system planning; system implementation
1.1 Before you Begin
Before you implement any physical security measures, you should understand the fundamental concepts in three areas. These areas are:
1. Assessing the security risks to your business.
2. Zones of protection.
3. Components of a security system: barriers, technology, procedures, and people.
As you work through the concepts in each of these areas, you will be able to answer the basic physical security questions: What is the goal of my current system? Is my system accomplishing its objectives? Why or why not? What, if anything, do I need to change? Are there other ways I can meet my goals?
1.1.1 What are your Security Goals?
Before you begin assessment of your security system, you need to know your security goals. All of your security activities should support these goals. If you don’t have a clear understanding of your goals, you will not be able to implement a cost effective system that meets your needs.
A clear statement of your security goals is usually built on answers to questions like the