Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Loss prevention  





2 Security risk management  



2.1  Types of risks  



2.1.1  External  





2.1.2  Internal  







2.2  Risk options  



2.2.1  Risk avoidance  





2.2.2  Risk reduction  





2.2.3  Risk spreading  





2.2.4  Risk transfer  





2.2.5  Risk acceptance  









3 Security policy implementations  



3.1  Intrusion detection  





3.2  Access control  





3.3  Physical security  





3.4  Procedures  







4 See also  





5 References  





6 Further reading  














Security management






العربية
Italiano
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Security management is the identification of an organization's assets i.e. including people, buildings, machines, systems and information assets, followed by the development, documentation, and implementation of policies and procedures for protecting assets.

An organization uses such security management procedures for information classification, threat assessment, risk assessment, and risk analysis to identify threats, categorize assets, and rate system vulnerabilities.[1]

Loss prevention[edit]

Loss prevention focuses on what one's critical assets are and how they are going to protect them. A key component to loss prevention is assessing the potential threats to the successful achievement of the goal. This must include the potential opportunities that further the object (why take the risk unless there's an upside?) Balance probability and impact determine and implement measures to minimize or eliminate those threats.[2]

Security risk management[edit]

The management of security risks applies the principles of risk management to the management of security threats. It consists of identifying threats (or risk causes), assessing the effectiveness of existing controls to face those threats, determining the risks' consequence(s), prioritizing the risks by rating the likelihood and impact, classifying the type of risk, and selecting an appropriate risk option or risk response. In 2016, a universal standard for managing risks was developed in The Netherlands. In 2017, it was updated and named: Universal Security Management Systems Standard 2017.

Types of risks[edit]

External[edit]

Internal[edit]

Risk options[edit]

Risk avoidance[edit]

The first choice to be considered is the possibility of eliminating the existence of criminal opportunity or avoiding the creation of such an opportunity. When additional considerations or factors are not created as a result of this action that would create a greater risk. For example, removing all the cash flow from a retail outlet would eliminate the opportunity for stealing the money, but it would also eliminate the ability to conduct business.

Risk reduction[edit]

When avoiding or eliminating the criminal opportunity conflicts with the ability to conduct business, the next step is reducing the opportunity of potential loss to the lowest level consistent with the function of the business. In the example above, the application of risk reduction might result in the business keeping only enough cash on hand for one day's operation.

Risk spreading[edit]

Assets that remain exposed after the application of reduction and avoidance are the subjects of risk spreading. This is the concept that limits loss or potential losses by exposing the perpetrator to the probability of detection and apprehension prior to the consummation of the crime through the application of perimeter lighting, barred windows, and intrusion detection systems. The idea is to reduce the time available for thieves to steal assets and escape without apprehension.

Risk transfer[edit]

The two primary methods of accomplishing risk transfer is to insure the assets or raise prices to cover the loss in the event of a criminal act. Generally speaking, when the first three steps have been properly applied, the cost of transferring risks is much lower.

Risk acceptance[edit]

All of the remaining risks must simply be assumed by the business as a part of doing business. Included with these accepted losses are deductibles, which have been made as part of the insurance coverage.

Security policy implementations[edit]

Intrusion detection[edit]

Access control[edit]

Physical security[edit]

Procedures[edit]

See also[edit]

  • IT risk
  • IT risk management
  • ITIL security management, an information security management system standard based on ISO/IEC 27001
  • Physical security
  • Retail loss prevention
  • Security
  • Security policy
  • Gordon–Loeb model for cyber security investments
  • References[edit]

    1. ^ "Manage IT Security Risk with a Human Element". Dell.com. Retrieved 26 March 2012.
  • ^ "From Security to Loss Prevention to Retail Asset Protection to Profit Enhancement". 7 February 2017.
  • Further reading[edit]



    Retrieved from "https://en.wikipedia.org/w/index.php?title=Security_management&oldid=1211191207"

    Categories: 
    Network management
    Computer security procedures
    Hidden categories: 
    Articles lacking in-text citations from August 2011
    All articles lacking in-text citations
    Use dmy dates from April 2021
    Articles needing additional references from March 2024
    All articles needing additional references
    Wikipedia articles incorporating text from the Federal Standard 1037C
    Wikipedia articles incorporating text from MIL-STD-188
     



    This page was last edited on 1 March 2024, at 08:20 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki