logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

How to Develop and Implement a Security Master Plan

How to Develop and Implement a Security Master Plan (Hardcover)

Timothy D. Giles (엮은이)
Auerbach Pub
296,870원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
243,430원 -18% 0원
12,180원
231,250원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

How to Develop and Implement a Security Master Plan
eBook 미리보기

책 정보

· 제목 : How to Develop and Implement a Security Master Plan (Hardcover) 
· 분류 : 외국도서 > 경제경영 > 부동산 > 일반
· ISBN : 9781420086256
· 쪽수 : 374쪽
· 출판일 : 2008-12-17

목차

The Business of Security

Why Should You Develop a Security Master Plan?

Engaging the Stakeholders

What Should Your Security Philosophies Be?

Contract Security Relationship

What Should Your Security Strategies Be?

Technology Migration Strategy

Equipment Replacement Schedules

 

Evaluate the Business’s Risks

Potential Risks to the Business

Defining What Your Risks Are

Information Gathering

The Workplace Violence Risk and Beyond

Domestic Violence in the Workplace

Other Risk Factors

Risks of Fraud and Corruption

Theft Risks

Overseas-Related Risks

Acts of Nature

Information Sources

Human Resources and the Security Plan

Reacting to a Defined Risk

Placing a Value on the Impact of Risk

 

Conducting a Site Security Assessment ? Part 1

Assessing Aspects of Security Administration

Documenting Post Orders and Procedures

Security Personnel Selection and Staffing Considerations

Employee Selection and Staffing Considerations

Application Form

Security Manual Documentation

Security Education Awareness

Contract Management and Audit

 

Conducting a Site Security Assessment ? Part 2

Assessing Aspects of Physical Security

Exterior Security Assessment ? Vehicle Access Controls

Parking Lot Security

Proper Use of Signage

Security Processing Operations ? Visitor and Contractor Controls

Proper Use of Lighting

Barriers, Doors, and Building Perimeters

Mechanical Locking Systems ? Locks and Keys

Submaster System

Key Administration

Security Officer Patrols

Security Officer Review

Crime Prevention Through Environmental Design

Security Staffing

Monitoring and Administering Physical Protection Systems

Stationary and High-Visibility Posts

Emergency Response Capabilities

Training

 

Conducting a Site Security Assessment ? Part 3

Assessing the Electronic systems

Event Driven

Fully Integrated

Closed Circuit Television

Access Control Systems

Access Control System Policy

Alarm Sensors and Reporting

Radio Systems

Technology Status ? Current and Future

 

Conducting a Site Security Assessment ? Part 4

Assessing Information Protection

Information Security Protection Programs

Computer and Network Security Ownership

Security and Computer Use Standards for Employees

Security Requirements

Implementing a Classification System

Investigation Requirements

Processing Departing Employees

Information Asset Security

System Misuse

Summary ? Information Protection

Government Regulations

 

Conducting an Assessment of the Security Organization

Reporting Structure

The Security Organization’s Structure

Mixed Security Forces

Separation of Duties

Other Issues

Security Skills

Evaluating the Security Officers

Evaluating the Shift Supervisors

Evaluating the CSO or Director of Security

Evaluating the Other Security Positions

Staffing Levels

Armed versus Unarmed Officers

 

Determining What Prevention, Crisis Management, and Recovery Programs Exist

Prevention and Recovery Programs

Business Intelligence Information

Crisis Management Planning

Corporate Reputation Crisis Plan

Corporate Investigations: Fraud, Financial, Criminal, Computer, and Network

Due Diligence Processes

Emergency Response Planning and Testing

Business Continuity and Disaster Recovery

Executive Protection Program

Internal Audit and Business Controls, Monitoring Programs, and Fraud and

Pre-employment Screening and Drug Testing

Risk Assessment Process (Annually)

Security Systems and Procedures

Terrorism, Bioterrorism, and the DHS: Threat Advisory System Response

Workplace Violence Prevention Program

References

 

Interviewing Executive and Security Management

Interview Executive Management to Understand Their Concerns and Issues

The Approach

Interpreting the Interview Answers

The Importance of Listening

Where to Start the Process

Beginning the Interview

Educating the Executives and Ensuring Their Buy-In

Interview Security Management to Understand Their Concerns and Issues

 

Review and Evaluate All Security-Related Contracts and the Information Protection Program

Security Business Contracts

Contractual Right to Audit

Contract Bid Process

Auditing Security-Related Contracts

Reviewing the Information Protection Programs

After-Hours Checks

IT Information Protection

Disaster Recovery Program Review

Information Security Awareness Training

Investigation Requirements

Review of Exit Interview Process

Information Asset Security Review

 

Constructing the Security Master Plan Document

Compiling, Organizing, and Evaluating the Information Gathered

Developing Your Recommendations

Initial Draft Review with Security Management

Recommendation with Solutions

Developing and Refining Security Philosophies, Strategies, and Goals

Involving the Stakeholders

Documenting the Master Plan

Developing the Recommendations Presentation

Estimating Cost Impacts

Project Management Skills

 

Typical Contents of a Security Master Plan

Content Listing and Organization

Structural Focus

Budgeting Focus

Establishing an ROI

 

Finalizing the Security Master Plan Process

The Recommendations Presentation

Where to Begin

Setting Your Goals

Asking the Tough Questions

Submitting the Finalized Security Master Plan

 

Utilizing Your Plan in Managing Your Business

Utilizing Your Plan for Periodic Quality Checks

It Is All about Timing

Keeping the Plan in Sync with the Business

Testing Your Plan Against the Latest Technology

Benchmarking and Business Process (Matrix) Management

Best of Breed

Business Process (Matrix) Management

 

Appendices

저자소개

Timothy D. Giles (엮은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책