CSMP NOTES

UNIT 1 - Security Risk Analysis

17052AlawsingyuerosalieU1final.docx (116936)

Right click to download any document

Supporting Documents

Background Notes

External Background Documents

Examples of Risk Analysis Methodologies

Risk Analysis Reports

Standards in Risk Analysis

Papers on Risk Analysis

 

UNIT 2 - Crime Prevention 

 

Right click to download

Supporting Documents

Background Notes

External Background Documents - General

External Background Documents - Nature or Nurture Debate

External Background Documents - Situational Crime Prevention

External Background Documents - CPTED Specific

External Background Documents - Fraud Specific

External Background Documents - Ethics, Bribery and Corruption

 

UNIT 3 - Managing the Security Function

 

Supporting Documents

Background Notes

External Background Documents

C-Suite Engagement

Convergence, Resilience and Adding Value

Job Descriptions and Person Specifications

Motivation

Security Officer Training

Screening

 Miscellaneous

 

UNIT 4 - Leadership and Management Core Skills

 

Supporting Documents

Background Notes:

External Background Documents

 

UNIT 10 -  Facility Counterterrorism

 

Please scroll further down for the Unit 10 support documents.

 

U10 TextBook Facility Counterterrorism.pdf (2081588)

U10 Common Mistakes.pdf (222587)

 

Supporting Documents

U10 Chatroom.pdf (212915)

U10 Workbook v0516 RENAME BEFORE SUBMISSION ACCORDING TO INSTRUCTIONS.docx (92571)

 

Background Notes

CSMP-Unit-10-Indicative-Content-and-Common-Mistakes-v0718.pdf (336)

 

External Background Documents

CNI Specific

Aus-Govt-national-guidelines-protection-critical-infrastructure-from-terrorism.pdf (280)
Australia-national-guidelines-protection-critical-infrastructure-from-terrorism.pdf (280)
Icon_ (385119)
POST-Report-on-Cybersecurity-and-CNI.pdf (280)

 

Emergency Planning

cpg_101_comprehensive_preparedness_guide_developing_and_maintaining_emergency_operations_plans_2010.pdf (336)
FEMA-Guide-for-All-Hazard-Emergency-Operations-Planning.pdf (336)
Icon_ (385119)

FEMA Publications

fema459-Incremental-Protection-for-Buildings-ch1.pdf (336)
Icon_ (385119)

General Terrorism Publications

europol_tesat_2016.pdf (336)
Global-Terrorism-Index-2015.pdf (280)
Global-Terrorism-Index-2016.2.pdf (336)
Icon_ (385119)
II_TRIA_ReportsandStudies_RAND-TRIA.pdf (280)
Inst for Economics and Peace Global-Terrorism-Index-2015 (1).PDF (336)
Inst for Economics and Peace Global-Terrorism-Index-2015.PDF (280)
msaic_seven_signs_terrorism.pdf (280)
Patterns_in_Global_Terrorism_in_2014.pdf (280)
RAND_what-terrorists-want.pdf (280)

Hostile Reconnaissance

BSIA-Hostile-Rec.pdf (336)
CPNI-2016-hostile-recconnaissance-guidance.pdf (336)
Hostile-use-of-drones-report_open-briefing.pdf (336)
Icon_ (385119)

Hostile Vehicle Mitigation Specific

CPNI-Hostile-Vehicle-Mitigation-detailed-.pdf (336)
CPNI-HVM-Operational-Requirements-Level-2-pdf-.pdf (336)
Icon_ (385119)
SELECTION-AND-APPLICATION-OF-VEHICLE-BARRIERS-ufc_4_022_02.pdf (336)

Incident Reports

Icon_ (385119)
In Amenas report.pdf (336)

Mail Threats

CPNI-introduction_to_pas_97_2015.pdf (336)
Icon_ (385119)

Mass Gathering Specific

CPNI-introduction_to_pas_97_2015.pdf (336)
Icon_ (385119)

Miscellaneous Physical Security Counter Terrorism Publications

CPNI-Bullet-resistant-glass.pdf (336)
DESIGN-TO-RESIST-DIRECT-FIRE-ufc_4_023_07.pdf (336)
DoD-Anti-Terr-for-Buildings-ufc_4_010_01_2018.pdf (336)
DoD-Security-Engineering-ufc_4_020_01.pdf (336)
Icon_ (385119)
RIBA-Guidance-Counterterrorism.pdf (336)
SECURITY-ENGINEERING-ufc_4_010_03.pdf (336)

Miscellaneous Procedural Counter Terrorism Publications

Bomb_Threat_and_Suspicious_Package_Management.pdf (336)
CPNI-pre-employment-screening-edition-5-2015.pdf (336)
CPNI-protecting_against_terrorism_3rd_edition.pdf (336)
Icon_ (385119)
NaCTSO_Your_Business.pdf (336)

MTFA_ Active Shooter Specific

Australia-active-shooter-guidelines-places-mass-gathering.pdf (336)
Complex-Coordinated-Terrorist-Attacks-DHS.pdf (336)
Icon_ (385119)
NaCTSO_Guidance_Note_1_-_2015_-_Dynamic_Lockdown_v1_0.pdf (336)

NaCTSO CT Protective Security Publications

Counter-Terrorism-Protective-Security-Advice-for-Health.pdf (336)
crowded-places-guidance_v1-170607_NaCTSO.pdf (336)
Icon_ (385119)
NaCTSO Major Events.pdf (336)
NaCTSO Stadia and Arenas.pdf (493)
NaCTSO-CT-Protective-Security-Advice-for-Higher-Education.pdf (336)
NaCTSO-CT-Protective-Security-Advice-for-Visitor-Attractions.pdf (336)

National Level Counter Terrorism Strategy

Australias-Counter-Terrorism-Strategy-2015.pdf (280)
Canada-National-CT-Strategy.pdf (280)
Icon_ (385119)
Kosovo-Strategy_for_Counter_Terrorism_2012-2017_eng.pdf (280)
Somalia-CT-Strategy.pdf (280)
UK-Government-Contest-Verson-June-2018.pdf (336)
US-counterterrorism_strategy-2011.pdf (336)

Others

DS_Store (280)
CNI Specific (280)
Emergency Planning (280)
FEMA Publications (280)
General Terrorism Publications (280)
Hostile Reconnaissance (280)
Hostile Vehicle Mitigation Specific (280)
Icon_ (385119)
Incident Reports (280)
Mail Threats (280)
Mass Gathering Specific (280)
Miscellaneous Physical Security Counter Terrorism Publications (280)
Miscellaneous Procedural Counter Terrorism Publications (280)
MTFA_ Active Shooter Specific (280)
NaCTSO CT Protective Security Publications (280)
National Level Counter Terrorism Strategy (280)

 

UNIT 11 - Protection of Information

Please scroll further down for the Unit 11 support documents.

ISMI CSMP Unit 11 Protection of Information v0718.1.pdf (1891214)
Annex 1.docx (158227)

Supporting Documents

 

Background Notes

11.1-Distributed-Denial-of-Service-Attacks.pdf (321451)
11.3-Trade-Secrets-in-the-US-and-the-DTSA-2016-Legislation.pdf (87049)

 

External Background Documents

Business Travel Information Security

Cyber-Tips-for-Travellers.pdf (820749)
Foiling-Cyberspies-on-Business-Trips-The-New-York-Times.pdf (3355068)
Guide-to-Protecting-US-Business-Info-Abroad.pdf (211051)
Traveling-with-Mobile-Devices-Trends-and-Best-Practices.pdf (1604012)

Cloud Security

The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf (971419)
 

Cyber Security Best Practice General

.DS_Store (8196)
10_steps_infographic-2015.pdf (664377)
10_steps_ten_critical_areas-2015.pdf (260538)
12-1119-cyber-risk-management-board-responsibility.pdf (2508782)
BCC-Digital-Survey-2017-Cybersecurity.pdf (174061)
cbi_cyber_security_intelligence_first.pdf (1229847)
Cyber-Security-guide_09102017.pdf (1548606)
Cyber-Security-Small-Business-Guide-NCSC-.pdf (1116315)
Cyber-Threat-How-to-Manage-the-Growing-Threat-of-Cyber-Attacks.pdf (2388539)
HMG-small-business-cyber-security-guidance.pdf (238744)
Intel-Prioritizing_Info_Security_Risks_with_TARA.pdf (469295)
ISACA-Information-Security-Govenance-for-Board-of-Directors-and-Executive-Management_res_Eng_0510.pdf (515853)
The-Data-and-Internet-Security-Guide-V2.pdf (2453581)
UK CESG 10-steps-to-cyber-security-executive.pdf (4337900)
UK-CESG-10-steps-to-cyber-security-executive-NXPowerLite-Backup-.pdf (3674257)
 

Espionage(General)

2018-US-Govt-Report-Foreign-Economic-Espionage-in-Cyberspace.pdf (2465034)
 

Information Security Best Practice General

ASIS-Guideline-Information-Asset-Protection.PDF (300974)
DTI-Guide-to-Business-Information-Security.pdf (48425)
DTI-Keeping-it-Confidential.pdf (65011)
DTI-Understanding-the-Risks.pdf (30819)
hipaainfosecuritytermsglossary.pdf (140188)

CISSP (ISC)2 Official Study Guide 7th Edition.pdf (39825094)
CISSP All-in-One Exam Guide, 7th Edition-McGraw-Hill(2016).pdf (83561950)
CISSP.CBK.Fourth.Edition.pdf (32426496)

 

Investigation and Incident Response

ACPO_guidelines_computer_evidence-1-.pdf (2790088)
ENISA-Good-practice-material-for-first-responders.pdf (995346)
NIST.SP.800-61r2-Computer-Security-Incident-Handling-Guide-.pdf (1480442)
 

IoT,Convergence and Migration of PPS to IP

175-000-IoT-cameras-can-be-remotely-hacked-thanks-to-flaw-says-security-researcher-ZD-Net.pdf (2039779)
Are-you-aware-of-the-threats-to-your-physical-security-system.pdf (175279)
Convergent_Sec_Risks_Physical_Sec_Systems.pdf (556698)
Cyber-Threats-in-Physical-Security-Understanding-and-Mitigating-the-Risk.pdf (228064)
How-hackers-will-exploit-the-Internet-of-Things-in-2017-Help-Net-Security.pdf (1879045)
The-Case-for-Integrating-Physical-and-Cyber-Security-WSJ.pdf (1395544)
The-Unstoppable-Convergence-of-Physical-Security-and-IT-and-Wha.pdf (220664)
What-are-the-common-vulnerabilities-of-IP-based-physical-securi.pdf (189569)
 

Media Sanitation

Icon_ (0)
NCSC-Secure-Sanitation-of-Storage-Media.pdf (75026)
 

Misc

Choosing-A-GoodChart-Dissected-FINAL.pdf (90081)
 

Miscellaneous Annual Reports

cyber_security_assessment_netherlands_2018.pdf (2060125)
infographic_cyber_security_assessment_netherlands_2018.pdf (600574)
 

Passwords

 

Perpetrators

Insider-Threat-Statistics-for-2019_-Facts-and-Figures-_-Ekran-System.pdf (919289)
NCA-Pathways-into-Cybercrime-2017-Report.pdf (1874819)
Verizon-insider-threat-report-executive-summary.pdf (2361958)
 

Personal Data Sepecifically

Icon_ (0)
US-DHS-Handbook-for-Safeguarding-Sensitive-PII_0.PDF (972395)


Supply Chain Security

Supply_Chain_Security_Collection_Jan2018.pdf (5889369)


WiFi

WiFi-Insecurity-Wired-Magazine.pdf (4001164)


Others

DS_Store (280)
Business Travel Information Security (280)
Cloud Security (280)
Cyber Security Best Practice General (280)
Espionage(General) (280)
Icon_ (340879)
Information Security Best Practice General (280)
Investigation and Incident Response (280)
IoT,Convergence and Migration of PPS to IP (280)
Media Sanitation (280)
Misc (280)
Miscellaneous Annual Reports (280)
Passwords (280)
Perpetrators (280)
Personal Data Sepecifically (280)
Supply Chain Security (280)
WiFi (280)

 

UNIT 12 - Protection of at-Risk Personnel

Please scroll further down for the Unit 12 support documents.

ISMI CSMP Unit 12 - Protection of at-Risk Personnel v919.pdf (1287021)
U12 Workbook v1114 RENAME BEFORE SUBMISSION ACCORDING TO INSTRUCTIONS.docx (54550)
 

Supporting Documents

cpg_101_comprehensive_preparedness_guide_developing_and_maintaining_emergency_operations_plans_2010.pdf (1783115)
Handbook-for-Journalists-Personal-Safety-.pdf (578374)

 

Background Notes

Active Shooter

ANCTZ-Active-Shooter-Guidelines-for-Places-of-Mass-Gathering.pdf (497316)
DHS-Active-Shooter-Response-Guide.pdf (1008180)
IAB-Improving-Active-Shooter-Hostile-Event-Response.pdf (568518)

 

Business Travel Security

AIG-Pre-Travel-Planning.pdf (927743)
CPJ-Journalist-Security-Guide.pdf (439426)
Golden_Rules_of_Travel.Travel_Safety_Management.Ebook.Intelligent_Travel.pdf (390120)
IOSH Managing the safety health and security of mobile workers.pdf (8904862)
K-R-Danger-Zones-Chartis.pdf (3159325)
Managing-Travel-Risks-Chubb.pdf (152211)
Operational-Security-Management-in-Violent-Environments.pdf (2266784)
OSAC-Security-Guidelines-for-Families-Overseas.pdf (385668)
The-six-major-risks-to-corporations-ass...ted-with-business-travel-Anvil-Group.pdf (983038)
Traveling-with-Mobile-Devices-Trends-and-Best-Practices.pdf (1542215)
Travel-Safety-Goes-Global-ASIS-Feature-Article.pdf (184303)


Kidnapping

 
Robbery
 
Workplace Voilence