Chapter_8 - Chapter 8 Risk Analysis and the Security Survey...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 8 Risk Analysis and the Security Survey
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Types of Security Responses (pg. 129) The book considers these as limited security responses: One-dimensional Security : which relies on a single deterrent, such as guards. Piecemeal Security : which ingredients are added to the loss- prevention function piece by piece as the need arises, without a comprehensive plan. Reactive Security : which responds only to specific loss events. Packaged Security : which installs standard security systems (equipment, personnel, or both) without relation to specific threats, either because “everybody’s doing it” or the theory that packaged systems will take care of any problems that might arise.
Background image of page 2
Risk Management (pg. 130) Risk Management: may be defined as making the most efficient before-the-loss arrangement for an after-the-loss continuation of business. Risk management allows risks to be handled in a logical manner, using long-held management principles. The first step in risk analysis is: to identify the risks, or specific vulnerabilities.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Security Survey (pg.131-132) One of management’s most valuable tools is the security survey. A Security Survey is essentially an exhaustive physical examination of the premises and a thorough inspection of all operational systems and procedures. Such an examination or survey has as its overall objective:
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/13/2008 for the course CJ 385 taught by Professor Nalla during the Spring '08 term at Michigan State University.

Page1 / 11

Chapter_8 - Chapter 8 Risk Analysis and the Security Survey...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online