Linked e-resources

Details

Cover; Half Title; Title Page; Copyright Page; Table of Contents; Preface; About the Author ; Introd uction ; 1: NIMS and the incident command system; Introduction; The history of the incident command system; National Incident Management System; What is NIMS ICS?; ICS management; Available NIMS ICS training; Conclusion; 2: Security management; Introduction; Types of security threats; External; Internal; Risk; Risk avoidance; Risk reduction; Risk spreading; Risk transfer; Risk acceptance; Security policy implementations; Intrusion detection; Access control; Physical security

Law enforcement agency (LEA) jurisdiction proceduresNon-executive powers jurisdictional coverage of Europol; Fraud management; Alarm management; Concepts; The need for alarm management; Some improvement methods; Nuisance reduction; Design guide; Documentation and rationalization; Advanced methods; The seven steps to alarm management; Step 1: Create and adopt an alarm philosophy; Step 2: Alarm performance benchmarking; Step 3: " Bad actor" alarm resolution; Step 4: Alarm documentation and rationalization (D&R); Step 5: Alarm system audit and enforcement; Step 6: Real-time alarm management

Step 7: Control and maintain alarm system performanceInformation technology (IT) risk; Committee on National Security Systems; Measuring IT risk; Occurrence of a particular set of circumstances; Estimation of likelihood; Estimation of technical impact; Estimation of business impact; Risk management as part of enterprise risk management; Risk-management methodology; Perceived security compared to real security; Categorizing security; Security concepts; Significance; Conclusion; 3: Threat/vulnerability assessments and risk analysis; Introduction; Threat assessment; Vulnerability assessment

Risk analysisUpgrade recommendations; Re-evaluation of risks; Understanding threats; Electronic risk assessment and vulnerabilities: Computer/network internal and external threats; IT security risk assessment and analysis: Reporting objectives; Methodology; The threat vulnerability assessment tool; Risk analysis description; Threat and vulnerability analysis; Threat and vulnerability analysis description; Attacks and threats; Principles of conducting risk characterizations; Conclusion; 4: Defense support of civil authorities (DSCA); Defense support of civil authorities

MOOTW also involves arms control and peacekeepingSelect American deployments; Selected British deployments; Select Japanese deployments; Select Australian deployments; Conclusion; 5: Introduction to weapons of mass destruction (WMDs); Chemical weapons of mass destruction; Sources of CW agents; Risks from chemical agents; Recent chemical terrorism events; Classification of chemical weapons; Chief categories of agents; Nerve agents; Vesicants/blister agents; Pulmonary damaging agents; Blood agents or cyanides; Riot-control agents; General treatment guidelines for all classes of chemical weapons

Browse Subjects

Show more subjects...

Statistics

from
to
Export