Today, threats to the security of an organization can come from a variety of sources — from outside espionage to disgruntled employees and internet risks to utility failure. Reflecting the diverse and specialized nature of the security industry, Security: An Introduction provides an up-to-date treatment of a topic that has become increasingly complex as more vulnerabilities arise.
Philip P. Purpura, recently selected by Security Magazine as one of the Top 25 Most Influential People in the Security Industry, shares his 30-plus years of professional experience in the industry to provide basic theory and real-world methodologies that security practitioners can apply to scenarios they encounter.
Topics discussed in this broad-based text include:
- The history of security and the role of security professionals
- Terrorism and national strategies for homeland security
- Crime prevention through environmental design
- Violence, theft, and drugs in the workplace
- Insider threats, pre-employment screening, and executive and personnel protection
- The security of physical structures
- Threats to information security, including malware and botnets; and risks to proprietary information and communication
- Security law and liabilities
- Investigations, interrogations, and surveillance
- Risk management, threats from natural disasters, and business continuity/enterprise resilience
- Critical infrastructures and key national resources
- The future of security technology
Utilizing real-world examples, each chapter begins with learning objectives and a list of key terms and ends with discussion questions, role-playing exercises, and links to relevant websites. The book offers readers a foundation for understanding and implementing best practices for security to more effectively protect people, assets, and organizations.
Section I The History and Profession of Security
Definition, Role, and History of Security
Security Defined
The Contexts of Security
The Roles of Security
The History of Security
Security in an Environment of Threats, Terrorism, and All-Hazards
Threats and Hazards
Terrorism
National Strategies
The Profession and Business of Security
The Business of Security
Professionalism and Security Associations
Ethics
Regulation of the Security Industry
Security Training
Higher Education
Careers
Section II Protecting People and Assets
Security Methodology
Methodology Defined
Security Business Proposals
Security Master Plans
Theories
Risk Analysis Methodology
Metrics
Practical Applications
Research and Evaluation
Security Strategies
Generic and Specific Security
Generic Security
Objectives of Security
Security Layers and Redundancy
Security Levels
Security Maxims
Force Multipliers
Violence in the Workplace
Theft in the Workplace
Drugs in the Workplace
Personnel Security
The Insider Threat
Preemployment Screening
Motivating Personnel
Executive and Personnel Protection
Physical Security
Physical Security Defined
Research Directions for Physical Security
Challenges of Physical Security
Challenges of Vulnerability Assessments
Security Standards
Information Technology and Physical Security
Physical Security
Information and Information Technology Security
Information as an Asset
Laws Protecting Proprietary Information
Threats to Information Technology and Data
Information Security
Security Law and Liabilities
The Development of Law
Criminal and Civil Law and Procedures
Law of Arrest
Weights of Evidence
Search and Seizure: Public Police
Search and Seizure: Private Security
Investigations
Investigations
Types and Guidelines of Investigations
Techniques of Investigation
Technology
Forensic Science
Section III Risk and All-Hazards Protection
Enterprise Risk Management and Resilience
Risk Management
Enterprise Risk Management
Enterprise Security Risk Management
Business Continuity and Enterprise Resilience
Emergency Management
Life Safety
Fire Protection
Protection of Critical Infrastructures and Key Resources
Protection Challenges
Early Critical Infrastructure Protection
National Infrastructure Protection Plan
Assessing Vulnerability of Critical Infrastructures and Key Resources
Critical Infrastructures and Key Resources
Section IV The Future
Twenty-First Century Security
Methodologies for Anticipating the Future
Predictions from the World Future Society
Predictions and Issues
Technology
Appendix
Index
Biography
Philip P. Purpura, Certified Protection Professional, is director of the Security and Justice Institute and coordinator of the Security for Houses of Worship Project in South Carolina. He has taught security and criminal justice courses for over thirty years. He serves on the ASIS International Council on Academic Programs. Purpura has practical experience as an expert witness, consultant, security manager, investigator, and police officer. He is the author of seven previous books; has been a contributing editor to three security periodicals; written numerous articles published in journals, magazines, and newsletters; and been involved in a variety of editorial projects for publishers. He holds bachelor’s and master’s degrees in criminal justice from the University of Dayton and Eastern Kentucky University, respectively. He has also studied in Europe, Asia, and the former Soviet Union.
For a long time, the security profession has lacked a comprehensive text addressing the fundamentals of protecting people, assets, and organizations. Security: An Introduction by Philip Purpura, CPP, is that book. Purpura has written a work that can be used as a text for the student studying security or in a criminal justice program, as a reference book for security specialists, and as a guide for organizations. He draws on his vast experience as a security professional to provide an exhaustive security curriculum for students, instructors, seasoned security professionals, and administrators alike. … Purpura has provided the security community with a thorough and well-organized text that addresses every aspect of security in a definitive way. This book, likely to become an influential one, could be a useful resource for both students and security practitioners.
—David Sayer, Owner of Orion Security Consulting, in Security Management, July 2011