دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1 ed.]
نویسندگان: Charles Swanson
سری:
ISBN (شابک) : 0367339617, 9780367339616
ناشر: Routledge
سال نشر: 2020
تعداد صفحات: 328
[329]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 2 Mb
در صورت تبدیل فایل کتاب Professional Security Management: A Strategic Guide به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مدیریت حرفه ای امنیت: راهنمای استراتژیک نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
از لحاظ تاریخی، مدیران امنیتی تمایل دارند از نیروهای مسلح یا مجری قانون تامین شوند. اما پیچیدگی روزافزون سازمانهایی که آنها را به کار میگیرند، همراه با فناوریهای به کار گرفته شده توسط آنها، تحول و گسترش نقش را وادار میکند و مدیران امنیتی برای موفقیت در حوزه کاری خود و حفاظت از داراییهای کارفرمایان خود باید با این چالش مقابله کنند. مدیریت ریسک، مدیریت بحران، مدیریت تداوم، عملیات استراتژیک کسب و کار، امنیت داده، فناوری اطلاعات و ارتباطات تجاری، همگی در حیطه اختیارات مدیر امنیت قرار دارند. این کتاب راهنمای رویارویی با این چالشها است که مجموعه مهارتها و دانش ضروری را برای مدیریت امنیت فراهم میکند تا با چالشهای پیش روی کسبوکارهای معاصر، بینالمللی یا فناوریگرا مواجه شود. این مبانی استراتژی، ریسک و فناوری را از دیدگاه مدیر امنیت پوشش می دهد و تنها بر \"نیاز به دانستن\" تمرکز دارد. خواننده از درک اینکه چگونه مدیریت ریسک اهداف عملکردی خود را با اهداف استراتژیک و عملیات سازمان همسو می کند، بهره مند خواهد شد. این کتاب ضروری از اعتباربخشی حرفهای و صلاحیتهای حرفهای مانند Chartered Security Professional (CSyP) یا Certified Protection Professional (CPP) پشتیبانی میکند، و در مورد مسیرهای تحصیلات عالی در زمینههای امنیت و مدیریت ریسک توصیه میکند. این برای هر مدیر ریسکی که به دنبال آموزش و توسعه خود است، و همچنین مکمل برنامه های مدیریت ریسک و امنیت با تمرکز بر عمل ایده آل است.
Historically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field and protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT, and business communications all fall under the purview of the security manager. This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focussing only on the \'need to know\'. The reader will benefit from an understanding of how risk management aligns its functional aims with the strategic goals and operations of the organisation. This essential book supports professional vocational accreditation and qualifications, such as the Chartered Security Professional (CSyP) or Certified Protection Professional (CPP), and advises on pathways to higher education qualifications in the fields of security and risk management. It is ideal for any risk manager looking to further their training and development, as well as being complementary for risk and security management programs with a focus on practice.
Cover Half Title Title Copyright Dedication Contents List of figures List of tables Acknowledgements Introduction Thinking like a criminal Aims Security management Exercise Brave Defender 1 Private security and the development of the security manager Policing and law enforcement The United Kingdom The Metropolitan Police Service (MPS) The US The UK police post-2008/09 The next great recession The dark figure of crime The private security sector Private security companies (PSC) The 2012 London Olympics The development of the security manager Management Security management The cultural debate 2 Security risk management and strategic business awareness The security professional and risk management Risk management responsibilities Crisis management and the security manager Strategic business awareness and the security manager Income generation 3 Critical security areas 3.1 Security risk management Security International security Timeline Personal security – extrapolating from above section National security International security Globalisation A potted history Walls and castles Risk Risk perception Risk perception case study: 9/11 The security risk assessment Competent persons and the security risk assessment Subject matter expertise Risk component parts Assets Brand and reputation Threats: capability combined with intent Vulnerability Likelihood Impact Risk treatment and control measures Reduce the risk Avoid the risk Risk transference Residual risk Risk acceptance Risk communication Exercise Brave Defender: security and risk management Scenario Britcom UK: 1 Canada Fields Security systems at 1 Canada Fields Access control Intruder detection system (IDS) Britcom plc Unique selling point Internal – SWOT External – PESTLE Synopsis Task 3.2 Crime Prevention Through Environmental Design (CPTED) and Situational Crime Prevention (SCP) CPTED Situational Crime Prevention Situational Crime Prevention activities Routine Activity Theory (RAT) Rational Choice Theory Synopsis 3.3 Physical and electronic security systems Defence in depth (DiD) Defence in depth (continued) The surrounding environment Perimeter Fencing Security lighting External access control Building fabric and construction Physical security standards Reception areas Electronic systems Closed circuit television (CCTV) Perimeter intruder detection systems (PIDS) and intruder detection systems (IDS) Internal access control Radio frequency identification (RFID) Synopsis 3.4 The security survey and the security audit The security survey Competency levels The security surveyor My vision – the professional security surveyor Registered security surveyor/auditor Synopsis 3.5 Business resilience Risk management Management policies, procedures, and practices Communicating, consulting, and establishing the context Identifying, analysing, evaluating, treating, monitoring, and reviewing risk Treating, monitoring, and reviewing the risk Identification of residual risks Monitoring and reviewing risk Crisis management The crisis management plan (CMP) Phases of a crisis Pre-crisis – preventing the crisis from occurring The financial crisis of 2008 Operational crisis – containment and control Post-crisis phase The crisis management team (CMT) CMT members CMT lead Human resources lead (director) Legal advisor Public relations (PR) and communications lead Security and safety Operations and logistics Business administration and finance The role of the crisis management team Crisis communications Senior management response Synopsis Exercise Noble Response Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7 Phase 8 Phase 9 Phases 1 to 7 – summary Reflection on the above Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7 Phase 8 Phase 9 Résumé Terrorist threat level: SEVERE Phase 10 Phase 11 Disaster management Disaster management and the disaster management cycle The Disaster Management Life Cycle Business continuity Business Business Continuity Planning (BCP) and Business Continuity Management Systems (BCMS) The Business Continuity Plan (BCP) Synopsis 3.6 The chief security officer (CSO) and the chief information security officer (CISO) The CSO The CISO Synopsis 3.7 Cybercrime and the cyberthreat The cyberthreat The Internet of Things Synopsis 3.8 Critical national infrastructure Interdependency Risk and critical infrastructures (CI) Threats to critical infrastructures Physical threats Fukushima Daiichi Physical Cyber The protection of critical infrastructure (CI) Cyber-NHS and ransomware Synopsis Task 3.9 Terrorism and counterterrorism Definitions and identification of terrorism The psychology and rationale of terrorism Radicalisation and de-radicalisation Radicalisation De-radicalisation and disengagement Terrorist methods of operation and attack platforms Irish terrorism The troubles The Fenians Partition 1969 – the Apprentice Boys march The Provisional Irish Republican Army (PIRA) The corporal killings PIRA external operations Jihad Islamic Jihadi terrorism Extreme right-wing terrorism Left-wing ideologies State-sponsored terrorism State patronage State assistance Synopsis Task 3.10 Aviation and maritime security management Aviation security Maritime security International terrorism MV Limburg USS Cole The ISPS Code Maritime Transportation Security Act (MTSA) of 2002 – USA Container Security Initiative (CSI) – US Customs Trade Partnership Against Terrorism (C-TPAT) – USA World Customs Organisation (WCO) Framework of Standards to Secure and Facilitate Trade (SAFE) Authorised Economic Operator (AEO) – EU Maritime security – piracy Synopsis Task 3.11 Supply chain security management Intermodal transportation Synopsis 3.12 Hostile environment awareness Beirut Synopsis 3.13 Strategic business awareness Britcom plc Synopsis Task 3.14 Fraud and fraud investigations Concern – 2018 PwC’s 2018 Global Economic Crime and Fraud Survey Fraud Types of fraud Synopsis and task 3.15 Retail loss and prevention methods The British Retail Consortium (BRC) Context and trends Violence and abuse Theft and damage Fraud Cyber Retail loss prevention Members of staff Organised criminals Opportunist criminals Mitigation Involve the right people with the right approach Venice and the unions The right people Resistance Choose activities and topics Plan and execute Synopsis 3.16 Workplace investigations Evidence Legislation Civil law Criminal law Acts of Parliament The investigation Planning Procedural transparency Synopsis Tasks 3.17 Academic and vocational qualifications SIA front line training Common security industry knowledge Security guarding specialist module Conflict management module The Regulated Qualifications Framework (RQF) Foundation degree Bachelor’s degree (BA/BSc) Master’s degree (MA/MSc/MLitt/MPhil) PhD Chartered status ASIS International 3.18 Conclusion Bibliography Index