1st Edition

Asset Protection and Security Management Handbook

Edited By James Walsh Copyright 2002
    580 Pages 57 B/W Illustrations
    by Auerbach Publications

    The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.

    Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management.

    INTRODUCTION TO ASSETS PROTECTION
    The Management Function
    Definition of Assets Protection
    Basic Considerations
    The Systems Approach
    Countermeasures
    The System Test
    Appendix A: Self-Inspection and Protection of Assets Check Sheet

    SECURITY VULNERABILITY
    Introduction
    Defining the Problem
    Loss Event Profile
    Loss Event Probability or Frequency
    Loss Event Criticality
    Alternative Approaches to Criticality
    Preparing A Solution
    Network Design
    Solving the Problem
    Economic Justification of Security
    Appendix A: Basic Security Survey
    Appendix B: Basic Matrix

    STRUCTURAL BARRIERS
    Introduction
    Barrier Categories
    Building Surfaces
    Evaluation of Building Surfaces
    Building Openings
    Bomb Protection
    Vehicle Barriers

    GENERAL LOCKING CONCEPTS
    Introduction
    Basic Lock Grouping
    Master Keying Mechanical Locks
    Security Vulnerabilities of Mechanical Locks
    Electrified Locking Mechanisms

    ALARM SENSORS
    Sensor Applications
    Security Applications
    Categories of Sensors
    Sensors for Fire Detection
    Appendix A: Federal Specification
    Components for Interior Alarm Systems

    SYSTEMS CONSIDERATIONS
    Introduction
    Alarm Termination
    Systems Design
    Cost Reduction and Protection Improvement
    The Automated Security System
    Emergency Power
    Appendix A: Glossary of Frequently Used Security Terms
    Appendix B: Glossary of Frequently Used Fire Terms

    ACCESS CONTROL
    Basic Access Control Objectives
    Granting/Denying Entry
    Authorized Access Control
    Coded Card Technology
    Distributed Intelligence Systems
    Special Access Features and Applications
    Weapons and Contraband Screening

    EMERGENCY PLANNING
    The First Step
    Advance Planning
    Planning Issues and Considerations
    After the Plan Is Written
    Appendix A: Company Disaster Control Program
    Appendix B: Resources and Logistics Equipment and Services

    INFORMATION SYSTEMS SECURITY: AN OVERVIEW
    Introduction
    Encoding Digital Data
    Processing Digital Data
    A Typical Central Processing Unit
    The Impact of Large-Scale Integration
    A Typical Information System
    Classes of Computers
    The Evolution of Information Systems
    What is Information Systems Security?
    Is Information Systems Security Important?
    The Evolution of Information System Risks
    Management of Information Systems Security
    Functional Definition of Information Systems Security

    INFORMATION SYSTEMS SECURITY
    Introduction
    Roles and Responsibilities
    Information Systems Security Policies, Procedures and
    Information Systems Security Program Management
    Information Systems Security and Planning
    Operating and User Controls
    Audit Trails and Transaction Logs
    The Internet

    INVESTIGATIONS: GENERAL COMMENTS
    Public- and Private-Sector Investigations
    Investigations - In General
    Qualities of an Effective Investigation
    Legal Guidelines
    Investigative Reports
    Appendix A: Selected Internet Investigative Resources

    SECURITY AND PROTECTIVE LIGHTING
    Introduction
    Lighting and Lighting Definitions
    Lighting Systems
    Lighting Economics
    Starting and Re-Strike
    Security Lighting Applications
    Security Lighting and Closed Circuit Video Systems
    Standards for Security Lighting Levels

    CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
    Introduction
    Understanding CPTED: Theory, History, and Practice
    Basic Crime Prevention Assumptions
    Contemporary Thinking on Crime and Criminals

    CONCEPTS OF RISK MANAGEMENT
    Reducing Crime through Physical Design
    Site Development and Security Zoning
    Security Design Criteria for Parking Facilities
    Design Considerations for Industrial Buildings
    Design Considerations for Office Buildings
    Special Considerations Regarding U.S. Federal Buildings
    Graphics and Signage for Crime Prevention and Environmental Security
    Summary

    UNITED STATES CRIMINAL LAW
    Introduction
    Federal and State Constitutions
    Statutory Law
    Definition and Classification of Crimes
    Case or Decisional Law
    Relevance to Asset Protection
    Important Procedural Considerations
    Deception Detection Instruments
    Conclusion

    THE CIVIL LAW
    Definition
    Major Branches
    Statutory Law
    Civil Common Law
    Torts In General
    The Area of Civil Rights

    SECURITY AS A MANAGEMENT FUNCTION
    Introduction
    Developing the Organization
    Program Implementation
    Communications
    Staffing the Protection Organization
    Program Management

    ETHICS IN THE SECURITY PROFESSION
    Introduction
    What Are Professional Ethics?
    The Security Profession
    The Professional Society
    The Code of Ethics of the American Society for Industrial
    Security
    The Practical Application of Professional Ethics
    Selected Bibliography

    DETECTING DECEPTION IN INTERVIEWS AND INTERROGATIONS
    Introduction
    Different Types of Responses
    Some Preliminary Cautions
    Verbal Responses
    Nonverbal Responses
    The Behavior Analysis Interview
    The Reid Nine Steps of Interrogation

    A PLAN FOR THREAT MANAGEMENT
    Overview
    The Concept of Threat Management
    Liability and Legal Considerations
    The Psychological Dynamic of Workplace Violence
    Pre-Employment Screening
    Physical Security
    Policy Statement and Reporting Procedure
    The Incident Management Team (IMT) and Supporting
    Resources
    The Incident Management Process
    Assessment Phase
    Appendix A: Model Policy for Workplace Threats and Violence
    Appendix B: Minimum Qualifications for Outside Consulting Team Members
    Appendix C: Normal Incident Assessment/Resolution Process

    INDEX

    Biography

    James Walsh

    "Overall an excellent book, a lot of valuable information…I would give the book 9 out of a possible 10 stars … Well organized and well written, the ideas and concepts flow in a methodical and progressive manner. … for those who have an interest in the subject matter, the book is a pleasure to read. …Excellent and well-documented references… it is clear that the author[s] did [their] homework… The appendices at the end of the chapters are quite valuable and have a lot of helpful secondary information. … All of the information is germane and relevant. … the writer[s] really know what they are talking about."
    -Ben Rothke, CISSP, Senior Security Architect, QinetiQ Trusted Information Management, Inc.