Actions for The science and technology of counterterrorism : measuring physical and electronic security risk
The science and technology of counterterrorism : measuring physical and electronic security risk / Carl Young
- Author
- Young, Carl S.
- Published
- Waltham, [Massachusetts] : Butterworth-Heinmann, 2015.
- Copyright Date
- ©2015
- Physical Description
- xx, 492 pages : illustrations ; 24 cm
- Contents
- Machine generated contents note: pt. I Modeling Terrorism Risk -- ch. 1 Terrorism Threats, Risk, and Risk Assessments -- 1.1.Introduction: Decisions and Risk -- 1.2.Threats and the Components of Risk -- 1.3.Risk Assessments -- 1.4.Security Risk Trade-Offs -- 1.5.Security Risk in Context -- 1.6.Risk Factors -- 1.7.Counterterrorism Controls -- 1.8.Counterterrorism Methods -- 1.9.Operational Requirements -- 1.10.Performance Specifications -- 1.11.Security Risk Assessment Frameworks, Security Standards, and Security Risk Metrics -- Summary -- References -- Problems -- ch. 2 Organizing and Assessing Terrorism Risk -- 2.1.A Taxonomy of Terrorism Threats -- 2.2.Counterterrorism Standards and Risk Metrics -- 2.3.The Cost of Risk Mitigation -- 2.4.Medical Analogies -- 2.5.Simple Risk Assessments -- 2.6.Security Theatre -- Summary -- References -- Problems -- ch. 3 Uncertainty and Terrorism -- 3.1.Introduction -- 3.2.Uncertainty, Entropy, and Randomness -- 3.3.The Normal Distribution -- 3.4.Uncertainty Applied to Terrorism -- Summary -- References -- Problems -- ch. 4 Physical Models of Terrorism -- 4.1.Introduction -- 4.2.Point Sources of Radiation -- 4.3.Exponential Growth and Decay -- 4.4.Harmonic Motion and the Single Degree of Freedom Model -- 4.5.Gaussian Plumes -- Summary -- Reference -- Problems -- ch. 5 Exploiting Terrorism Uncertainty -- 5.1.Introduction: Addressing Terrorism Risk Factors -- 5.2.Risk Factor-Related Incidents; Indirect Measurements of Security Risk -- 5.3.The "Probability of Protection" Method -- 5.4.The Probability of Protection Method Summary -- 5.5.Physical Access Control System Risk Statistics -- Summary -- Reference -- Problems -- pt. II Measuring Terrorism Risk -- ch. 6 Conventional Explosive Threats and Risk Mitigation -- 6.1.Introduction -- 6.2.Applying the Single Degree of Freedom Model -- 6.3.Explosive Overpressure and Impulse Parametric Scaling -- 6.4.Blast Effects: A Qualitative Description -- 6.5.The Effects of Distance and Payload -- 6.6.Vehicle-Borne Explosives -- 6.7.Vehicle-Borne Explosive Risk: A Simple Calculation -- 6.8.Barriers and Bollards -- 6.9.Assessing Bollard Effectiveness -- 6.10.Antiblast Film -- 6.11.Explosive Detection -- 6.12.X-Ray Inspection Technology -- 6.13.The Dangling Crane: Terror Without Terrorists -- Summary -- References -- Problems -- ch. 7 Nontraditional Terrorist Threats and Risk Mitigation -- 7.1.Introduction -- 7.2.Radiological Dispersion Devices (RDDs) -- 7.3.Biological Threats and Risk -- 7.4.Chemical Threats and Risk -- 7.5.Electromagnetic Pulse Threats and Risk -- Summary -- References -- Problems -- ch. 8 Electronic Terrorism Threats, Risk, and Risk Mitigation -- 8.1.Introduction to Electronic Security -- 8.2.Denial-of-Service (DoS) Attacks and Security Controls -- 8.3.Advanced Persistent Threats (APT)/Malware, Client-Side Exploits, and Security Controls -- Summary -- References -- Problems -- ch. 9 The Convergence of Electronic and Physical Security Risk -- 9.1.Introduction: Cultural and Organizational Drivers of Security -- 9.2.Electronic and Physical Security Vulnerabilities of a Physical Access Control System -- 9.3.Physical Security of Data Centers -- 9.4.An Indicative Data Center Physical Security Standard -- 9.5.Virtualized Environments and the Concentration of Information Security Risk -- 9.6.The Integration of Physical and Electronic Security within Active Directory -- 9.7.Physical Security Risk and Electronic Vulnerabilities -- Summary -- References -- Problems -- pt. III Counterterrorism Controls -- ch. 10 Authentication, Authorization, and Affiliation -- 10.1.Introduction -- 10.2.Organizational Affiliation -- 10.3.Background Investigations -- 10.4.Insider Threats and Risk Mitigation -- 10.5.A Mantra for Affiliation -- 10.6.Confirming Authorization for Access to Restricted Space -- 10.7.Physical Access Control IDs and Credentials -- 10.8.Contactless Smart Cards and Proximity Cards -- 10.9.Radiofrequency IDs (RFID) -- 10.10.The Security of Contactless Smart Cards Versus Magnetic Stripe Technologies -- 10.11.Multifactor Authentication of Identity -- 10.12.Biometric Authentication of Identity -- Summary -- References -- Problems -- ch. 11 Closed Circuit Television -- 11.1.Introduction -- 11.2.Analog and IP CCTV Cameras -- 11.3.CCTV Cameras and Optics -- 11.4.Lighting -- 11.5.Focal Length and f-Number -- 11.6.Angle-of-View and Field-of-View -- 11.7.Depth-of-Field -- 11.8.Sensitivity -- 11.9.Signal-to-Noise (S/N) Ratio -- 11.10.CCTV Image Creation -- 11.11.CCTV Image Recording -- 11.12.CCTV Signal Bandwidth and Storage Requirements -- 11.13.CCTV Image Resolution -- 11.14.Resolution Requirements for Submegapixel CCTV Systems -- 11.15.Resolution Requirements for Megapixel CCTV Systems -- 11.16.CCTV Video Compression -- 11.17.CCTV and Security Systems Integration -- 11.18.CCTV Cabling -- 11.19.CCTV Signal Security -- 11.20.CCTV Operational Summary -- 11.21.Special CCTV System Requirements -- 11.22.CCTV System Performance Specifications -- Summary -- References -- Problems -- ch. 12 Physical Access Restriction, Incident Detection, and Scenario Monitoring -- 12.1.Introduction -- 12.2.Electric Strikes and Magnetic Locks -- 12.3.Doors and Portals -- 12.4.The Ten Plus One Commandments of Physical Access -- 12.5.The Importance of Physical Access Control System Specifications -- 12.6.Physical Access Control System Architecture and Signaling -- 12.7.Physical Access Control System Specifications -- 12.8.Security Incident Monitoring and Detection -- Summary -- References -- Problems.
- Subject(s)
- ISBN
- 9780124200562
0124200567 - Bibliography Note
- Includes bibliographical references and index.
View MARC record | catkey: 12534593