Contemporary Security Mangement Author:John Fay SHORT BLURB/BRIEF DESCRIPTION: — This is the third in a series of proposals for new editions of existing texts that have been adopted by DeVry University. In this case, the Keller Graduate School of Management at DeVry University has adopted Contemporary Security Management for their Master's Degree Program in Business Administration, Security M... more »anagement concentration. It is at Keller's request that we update the material presented by John Fay in his original edition of the work.
CONTEMPORARY SECURITY MANAGEMENT, 2e will be updated from the successful first edition which provides current, experience-proven business practices applicable to security operations. Vital topics covered include: managing in times of risk, target-hardening against terrorism, and strategies for cross-functional leadership.
The author proposes he add two new chapters to cover terrorism and the new government mandate to perform standard vulnerability assessments for various industries. His outline of proposed changes is as follows:
· The Terrorist Threat
o International -- Al Qaeda; Hezbollah; Hamas; FLN; Sendero Luminoso; etc.
o Domestic -- Aryan Nation; Animal Liberation Front; Environmental Liberation Front; etc.
· Terrorist Motivations
Political; Religious; Racial; Environmental; Special Interest
· The Early Signals of Terrorism
Target Surveillance; Information Collection; Tests of Security; Acquisition of Supplies; Dry Runs; Positioning to Act
· Rating the Terrorist Group
History; Current Configuration; Capabilities; Resolve; Target Preferences
Visibility of the Potential Target; Criticality of the Potential Target; Probability of Attack; Potential Consequences; Adversary Access and Proximity; Population Casualties; Collateral Damage
· Vulnerability Assessment Models
Generic; Industry Specific --Petroleum; Chemical; etc.
· Vulnerabilities of Facilities
Power; Water; Sewage; IT; HVAC
· Special Targets
Government Buildings; High-Impact Industrial Facilities; Financial Centers; Entertainment Venues; Schools; Hospitals; Food Supply Systems; Transportation Systems
· Applicable Security Concepts
All hazards and Design-Basis Analyses; Environmental Design; Stand-off Distance; Protection in Depth; Redundancy; Operations Security (OPSEC); Mitigation and remediation
· Security Plan Development
Gather and Analyze Data; Identify Critical Assets; Assess Current Protective Scheme; Identify Needs (Physical Security; Procedures; Manpower);; Write the Plan; Multidisciplinary Buy-In; Organize, Equip, and Train; Rehearse; Evaluate
· Samples
Vulnerability Assessment Checklist; Elements of a Security Plan; Department of Energy Best Practices
Ancillary material: Instructor's Manual and Power Point Slides
UNIQUE FEATURE:
· An experience-proven, practical approach to the business of security
· Author, John Fay, is very well known among security professionals and his sensible, down-to-earth style is accessible to those new to the business
BENEFIT TO THE READER:
· Case studies throughout the text provide real-world examples and solutions to management issues.
· Samples of security plans and procedures, checklists, diagrams and illustrations aid in explaining a wide range of critical concepts« less