Know Your Vulnerabilities

Khairallah, Michael
February 2007
Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p66
Trade Publication
The article provides information on the need of conducting vulnerability study in the U.S. Vulnerability study assess security measures, facility's ability in responding to threats and distinguish the needed developments. An outline on how to conduct the proper sequence and techniques is presented including the inspection of all identified assets, creating a protected perimeter for each asset and assessment of the physical barricades that compromise the secured perimeter.


Related Articles

  • Industrial estates are magnet for criminals.  // Professional Engineering;6/14/2006, Vol. 19 Issue 11, p13 

    The article reports that a study from the Buildings Research Establishment (BRE) in England found that criminals are increasingly targeting businesses on industrial estates as offenses go unchecked and disparate security measures have been inadequate. BRE studied crime at a large industrial...

  • Monitoring the Latest Developments in Access Control. Shaver, John Michael // EC&M Electrical Construction & Maintenance;May2007, Vol. 106 Issue 5, p28 

    The article discusses the security management as an integral part of a commercial building designed. It mentioned that the improvements in security systems and its technology as part of the access control system in a building design in order to have a critical factor in choosing an appropriate...

  • Can You Tell It to the Judge? Murphy, Patrick // Security: Solutions for Enterprise Security Leaders;Mar2014, Vol. 51 Issue 3, p99 

    The article offers the author's insights on aspects regarding litigation of claims related to security planning caused by violent criminal act against corporate property and lives. Topics discussed include corporate risk avoidance planning, best practices in security management, and employee...

  • Target hardening, values cut crime. Zalud, Bill // SDM: Security Distributing & Marketing;Sep97, Vol. 27 Issue 10, p11 

    Editorial. Focuses on the effectiveness of security technology in situational crime prevention in the United States. Target hardening; Access controls; Physical barriers; Gun controls; Entry/exit screening; Surveillance; Property identification.

  • Armed Robbery Policy Questioned.  // Security: Solutions for Enterprise Security Leaders;Sep2000, Vol. 37 Issue 9, p11 

    Examines the security procedures of companies in the United States. Policy of 7-Eleven to let employees do what the offender says; Use of closed circuit television, silent alarm pendants and automatic cash registers by White Hen Pantry to prevent would-be criminals; Risk factors on the...

  • Invest in your self-defense. Siciliano, Robert L. // Good Housekeeping;Nov96, Vol. 223 Issue 5, p170 

    Presents several strategies to keep you and your family safe at home and away. Safety on the streets; Safety strategies in protecting oneself and the car; Nine pointers that can help make your house an unlikely target for burglars; Precautions to reduce vulnerability; More. INSETS: Street...

  • Curbing workplace violence. Roberts, Sally // Business Insurance;2/21/94, Vol. 28 Issue 8, p2 

    Discusses the need for employers to implement tighter security measures to minimize workplace violence. Damages awarded to parents of four teenage girls who were murdered during a robbery at a store in Austin, Texas; Employers and insurers' failure to address employee security concerns; Number...

  • Safe + secure.  // Australian House & Garden;Feb2004, Issue 2, p59 

    Home is so much more than four walls and a roof overhead. For most people, it's a haven of safety and security from the outside world. The feeling of comfort it brings is not only physical, but emotional, too. With this in mind, this article has been filled with simple, practical ways to make...

  • Surveillance Studies Needs Gender and Sexuality. Ball, Kirstie; Green, Nicola; Koskela, Hille; Phillips, David J. // Surveillance & Society;Nov2009, Vol. 6 Issue 4, p352 

    An introduction is presented in which the editor discusses various reports published within the issue on topic including the public response to surveillance, the categorization for gendered and sexualized objects, and the methods used.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics