Chapter 3: Conducting the Vulnerability Study to Identify Physical Security Requirements.

Autor: Khairallah, Michael
Zdroj: Physical Security Systems Handbook; 2005, p51-81, 31p, 2 Diagrams, 3 Charts
Abstrakt: Chapter 3 of the book "Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems," by Michael Khairallah, is presented. This chapter highlights the techniques employed in conducting a vulnerability study to determine the threats discovered during the Physical Threat Assessment. A Vulnerability Study identifies all openings in the protected perimeter and creates the optimum means to control and monitor such openings.
Databáze: Supplemental Index