ABSTRACT

Without fail, the rst step in improving security on a property is conducting a security survey. The security survey includes the elements described in earlier chapters: risk, threat, and vulnerability analysis. There are more versions of security surveys and checklists than there are alligators in the Everglades. The challenge is to determine which methodology to use. Several accepted methodologies for risk analysis and vulnerability assessments exist. The Sandia Labs Risk Assessment Methodology is available for several different types of environments: water and dams, infrastructure, cities, and more. The Homeland Security Critical Assessment methodology of HLS-Cam is another. The ISC/GSA security methodology has been available for federal buildings. The Department of Defense has their survey form and methodology as part of UFC, and the recent FEMA 426 publication, Mitigating the Impact on Terrorism, has survey forms. Our book proposes the ATRIM risk model for assessments. Companies now sell security survey software for use on laptops and palm pilots. But the questions remain as to how user-friendly they are, and will you really use the survey?