UNIT 1 - Security Risk Analysis
17052AlawsingyuerosalieU1final.docx (116936)
Right click to download any document
Supporting Documents
Background Notes
- Note 1.1 - An Introduction to ISO 31000
- Note 1.2 - Garcia Facility Characterisation
- Note 1.3 - Negligent Failure to Plan
External Background Documents
Examples of Risk Analysis Methodologies
- API Security Vulnerability Assessment
- Hearts and Minds RAM
- Warwickshire Risk Management Template
- WBDG Threat/Vulnerability and Risk Assessments
- The Orange Book - Management of Risk
- Risk Assessment Methodologies for CNI
- FDA - An Overview of CARVER+Shock
- Microsoft Security Risk Management Guide
- Harnser Group Security Risk Management for Energy Infrastructure
- NIPC Risk Management Critical Assets
- CDC Risk Management Plan Template
Risk Analysis Reports
- Securitas 2015 Top 15 Security Threats
- Lloyds Pandemic Insurance Impacts
- UK National Risk Register 2015
- UK National Risks Register 2017 - too large to store; email if copy required
- World Economic Forum Global Risks Report 2015
- World Economic Forum Global Risks Report 2016
- World Economic Forum Global Risks Report 2017
- SEC Top Risks to Organisations
- G4S 2017 Q2 Global Risks
- US Govt Global Threat Assessment 2017
Standards in Risk Analysis
Papers on Risk Analysis
- Five Steps to Risk Reduction
- Security Risk Management Seminar Loughborough
- Negligent Failure to Plan
- Understanding Risk; Informing Decisions in a Democratic Society
Right click to download
Supporting Documents
Background Notes
- 2.1 Employee Socialization and Retention
- 2.2 Psychological Explanation of Deviant Behaviour
- 2.3 One in 25 Business Leaders may be a Psychopath
- 2.4 The Broken Window Theory
- 2.5 Key Findings of the 2012 ACFE Report on Occupational Fraud
- 2.6 The Pygmalion and Golem Effects
- 2.7 Labelling Theory and Howard Becker
- 2.8 Crime Facilitators
- 2.9 The Four Eyes Principle
- 2.10 CPTED - A Unifying Force for Hospital Security
- 2.11 Do Human Warrior Genes Make Voilent Criminals
External Background Documents - General
- Whistleblowing 1
- Whistleblowing 2
- Laptop Theft - Calgary Case Study
- MI5 Managing the Insider Threat
- ASIS Crisp Burglary Report
- 2002 Commercial Crime Survey UK
- Employee Theft
- CPNI Personnel Security Offshore
- CPNI Personnel Security Good Practice Guide 2014
- Employee Retection and Socialization
- Professional Facilitators of Crime
- Opportunity Makes the Thief - Felson and Clarke
- BRC Insider Threat Best Practices 2015
- Body Worn Cameras UK Police Guidance
- Wearing Body Cameras Increases Assaults - Study
- Repeat Burglaries - How at Risk Are We?
- New Research Challenges Broken Window Theory
- University of Glasgow - Causes of Crime
External Background Documents - Nature or Nurture Debate
- AJCSD - Criminal Behaviour - Free Will v. Determinism
- Keith Rice - Biological Factors in Crime
- Do Your Genes Make You a Criminal
- Human Warrior Genes and Violence
External Background Documents - Situational Crime Prevention
- Crime Analysis for Problem Solvers (Good hints on SCP strategies)
- AIC - Understanding Situational Crime Prevention
- 25 Techniques of Situational Crime Prevention
- 7 Misconceptions about Situational Crime Prevention
External Background Documents - CPTED Specific
- NCPC Singapore - Applying CPTED
- POP Center - CPTED
- Queensland Govt - CPTED Application
- Abu Dhabi Safety and Security Planning Manual
External Background Documents - Fraud Specific
External Background Documents - Ethics, Bribery and Corruption
- Trace Bribery Report 2011
- KPMG Bribery and Corruption 2015
- Transparency International - Countering Bribery
- Oxy Code of Ethical Practice
UNIT 3 - Managing the Security Function
Supporting Documents
Background Notes
- 3.1 Line, Staff and Functional Organisation
- 3.2 The Rise of the Chief Security Officer: What It Means for Corporations and Customers
- 3.3 Tough CSO Interview Questions
- 3.4 How Can Heads of Security Speak the Language of Business
- 3.5 The View from the Top
External Background Documents
C-Suite Engagement
Convergence, Resilience and Adding Value
- DEMOS - Business of Resilience
- AESRM Convergence
- CSO Online - State of the CSO
- The Case for Integrating Physical and Cyber Security - WSJ
Job Descriptions and Person Specifications
Motivation
- CPNI Motivation with the Security Industry (Pages 1-20 Extract)
- CPNI Motivation with the Security Industry (full document)
- Fostering the Work Motivation of individuals and Teams
- CMI Motivating Your Employees in a Time of Change
Security Officer Training
- ASIS Guideline Security Officer Selection
- Guard Training Requirements
- Security Officer Training
- SIA Security Guard Training
Screening
- ASIS Guideline Preemployment Background Screening
- CPNI Pre-employment Screening Good Practice Guide Edn 5
- CPNI Personnel Security in Offshore Locations
- Managing the Risk (Insiders)
- Personnel Security Offshore Reasearch by KPMG
- NACTSO - Secure in the Knowledge
- BS 7858 Screening of Security Staff - Draft
Miscellaneous
- Blooms Taxonomy (when writing training objectives)
- Australian Govt - Good Security, Good Business
- National Occupational Standards for Security Management
- ASIS Foundation Sports Team Travel Security
- SM Magazine - Measuring Guard Performance
- Example Strategic Risk Management Plan
- How to Write a Strategic Risk Management Plan
UNIT 4 - Leadership and Management Core Skills
Supporting Documents
Background Notes:
- 4.1 Henri Fayol's Principles of Management
- 4.2 Mechanistic vs Organic Organisations
- 4.3 The Difference between Management and Leadership
- 4.4 Patterson, Chapter 3. Project Management for PPS
- 4.5 What Keeps the CEO up at Night?
- 4.6 The Two-Way Manager
- 4.7 What Makes a Great Security Leader
- 4.8 Drucker's 5 Essential Questions for Entrepeneurs
External Background Documents
- ASIS Preparing a Business Case Guide
- CMI Briefing Paper - Henri Fayol
- INSEAD - Developing Leaders and Leadership Development
- Leadership Quarterly Journal - Team Leadership
- CIPD Engaging Leadership
- Exeter Uni - Leadership Theory and Competency
- Exeter Uni - What is Leadership?
- HBR - Primal Leadership
- Rotary International - Leadership Development
- Example Project Scope Document 1
- Example Project Scope Document 2
- Example Project Scope Document 3
- Project Management - A Guide to Project Assumptions and Constraints
- Transformational Leadership Vs. Transactional Leadership Definition
- Transactional Leadership Style & Conflict Approach
- How to Improve Transformational Leadership
- How to Improve Organizational Effectiveness Through Transformational Leadership
- Seven Principles of Transformational Leadership
- Four Elements of Transformational Leadership
- ASIS Persuading Senior Management Security Metrics
- Aon - Managing Engagement During Times of Change
- An Expanded View of Successoion Planning
UNIT 5 - Security Design, Evaluation and Surveying
UNIT 6 - Perimeter Protection
Supporting Documents
Background Notes
- 6.1 Design Basis Threat
- 6.2 Geopolitical Analysis
- 6.3 Guidelines on Drawings
- 6.4 Crime Analysis
- 6.5 Adversary Questions to Help with the Design Basis Threat
- 6.6 Performance Statement Examples
- 6.7 LED Street Lighting - Hereford Case Study
- 6.8 25 Things You Need to Know about Lighting
External Background Documents
UNIT 7 - Protecting Buildings
- Unit 7 Workbook
- Unit 7 Case Study Document
- ISMI CSMP Unit 7 - Protecting Buildings v1218.pdf (1741911)
Supporting Documents
Background Notes
External Background Documents
- CPNI Guide to Locks and Door Security
- CRISP Security of Tall Buildings
- Guide to BS Standards for Locks
- Merseyside Police - Business Security Guide
- Premises Security and Burglary Risk Management Guide
- UFC 4 21 02 Electronic Security Systems
Robbery (for Task 7.2b)
- Durham Police Petrol Station Robbery Toolkit
- Canadian Violence Robbery and Theft Guide
- OHS Guideline Preventing Violence, Robbery and Theft
- Portland Police Robbery Prevention Guide
UNIT 8 - Access Management
Coaching for U8 opens on 2 July.
Please scroll further down for the Unit 8 support documents.
Supporting Documents
- Unit 8 Indicative Content and Common Mistakes
- Unit 8 Chatroom Transcript
- Task drawings as a ppt
Background Notes
- Background Note 8.1 RFID Chips and Tracking Humans
- Background Note 8.2 Tracking Patients with RFID
- Background Note 8.3 Emergency Room Patients Tracked with RFID
- Background note 8.4 Office Puts Chips under Staff's Skin
External Background Documents
- BSIA Specifiers Guide to Access Control Edn 4 2016
- Ekahau RTLS_benefits_whitepaper_June_2013
- RTLS why you need it - Zebra Technologies
- RFID Laptop Tracking - Case Study
- Facial Recognition
- BSIA Code of Practice for Searching
- UFC Entry Control Facilities
- Sample Physical Protection Policy
- Santa Barbara Uni Access Contol Policy
- CPNI Guide to Producing Operational Requirements 2016
- CPNI Guilde to Producing Operational Requirements (MW Word conversion)
- Door Entry Installation Guide - The Basics
- Draft NRC Entry Control Doc
UNIT 9 - CCTV
Please scroll further down for the Unit 9 support documents.
Supporting Documents
Background Notes
External Background Documents
- 4K-Security-Cameras-–-All-You-Need-to-Know-_-Stephen-Smith
- Axis-Video-Analytics
- Bosch-DORI-Scene-Widths-for-SD-up-to-4K-with-Lens-examplesBosch-Video-Analytics
- BSEN50132-7-DPC-compressed
- BSIA-Privacy-Masking-CCTV
- Cisco CCTV IPVS-DesignGuide
- CISCO
- HOSDB CCTV OR Manual
- IPVM-Video-Surveillance
- TYCO-A-Guide-to-IP-CCTV
UNIT 10 - Facility Counterterrorism
Please scroll further down for the Unit 10 support documents.
U10 TextBook Facility Counterterrorism.pdf (2081588)
U10 Common Mistakes.pdf (222587)
Supporting Documents
U10 Workbook v0516 RENAME BEFORE SUBMISSION ACCORDING TO INSTRUCTIONS.docx (92571)
Background Notes
CSMP-Unit-10-Indicative-Content-and-Common-Mistakes-v0718.pdf (336)
External Background Documents
CNI Specific
Aus-Govt-national-guidelines-protection-critical-infrastructure-from-terrorism.pdf (280)
Australia-national-guidelines-protection-critical-infrastructure-from-terrorism.pdf (280)
Icon_ (385119)
POST-Report-on-Cybersecurity-and-CNI.pdf (280)
Emergency Planning
cpg_101_comprehensive_preparedness_guide_developing_and_maintaining_emergency_operations_plans_2010.pdf (336)
FEMA-Guide-for-All-Hazard-Emergency-Operations-Planning.pdf (336)
Icon_ (385119)
FEMA Publications
fema459-Incremental-Protection-for-Buildings-ch1.pdf (336)
Icon_ (385119)
General Terrorism Publications
europol_tesat_2016.pdf (336)
Global-Terrorism-Index-2015.pdf (280)
Global-Terrorism-Index-2016.2.pdf (336)
Icon_ (385119)
II_TRIA_ReportsandStudies_RAND-TRIA.pdf (280)
Inst for Economics and Peace Global-Terrorism-Index-2015 (1).PDF (336)
Inst for Economics and Peace Global-Terrorism-Index-2015.PDF (280)
msaic_seven_signs_terrorism.pdf (280)
Patterns_in_Global_Terrorism_in_2014.pdf (280)
RAND_what-terrorists-want.pdf (280)
Hostile Reconnaissance
BSIA-Hostile-Rec.pdf (336)
CPNI-2016-hostile-recconnaissance-guidance.pdf (336)
Hostile-use-of-drones-report_open-briefing.pdf (336)
Icon_ (385119)
Hostile Vehicle Mitigation Specific
CPNI-Hostile-Vehicle-Mitigation-detailed-.pdf (336)
CPNI-HVM-Operational-Requirements-Level-2-pdf-.pdf (336)
Icon_ (385119)
SELECTION-AND-APPLICATION-OF-VEHICLE-BARRIERS-ufc_4_022_02.pdf (336)
Incident Reports
Icon_ (385119)
In Amenas report.pdf (336)
Mail Threats
CPNI-introduction_to_pas_97_2015.pdf (336)
Icon_ (385119)
Mass Gathering Specific
CPNI-introduction_to_pas_97_2015.pdf (336)
Icon_ (385119)
Miscellaneous Physical Security Counter Terrorism Publications
CPNI-Bullet-resistant-glass.pdf (336)
DESIGN-TO-RESIST-DIRECT-FIRE-ufc_4_023_07.pdf (336)
DoD-Anti-Terr-for-Buildings-ufc_4_010_01_2018.pdf (336)
DoD-Security-Engineering-ufc_4_020_01.pdf (336)
Icon_ (385119)
RIBA-Guidance-Counterterrorism.pdf (336)
SECURITY-ENGINEERING-ufc_4_010_03.pdf (336)
Miscellaneous Procedural Counter Terrorism Publications
Bomb_Threat_and_Suspicious_Package_Management.pdf (336)
CPNI-pre-employment-screening-edition-5-2015.pdf (336)
CPNI-protecting_against_terrorism_3rd_edition.pdf (336)
Icon_ (385119)
NaCTSO_Your_Business.pdf (336)
MTFA_ Active Shooter Specific
Australia-active-shooter-guidelines-places-mass-gathering.pdf (336)
Complex-Coordinated-Terrorist-Attacks-DHS.pdf (336)
Icon_ (385119)
NaCTSO_Guidance_Note_1_-_2015_-_Dynamic_Lockdown_v1_0.pdf (336)
NaCTSO CT Protective Security Publications
Counter-Terrorism-Protective-Security-Advice-for-Health.pdf (336)
crowded-places-guidance_v1-170607_NaCTSO.pdf (336)
Icon_ (385119)
NaCTSO Major Events.pdf (336)
NaCTSO Stadia and Arenas.pdf (493)
NaCTSO-CT-Protective-Security-Advice-for-Higher-Education.pdf (336)
NaCTSO-CT-Protective-Security-Advice-for-Visitor-Attractions.pdf (336)
National Level Counter Terrorism Strategy
Australias-Counter-Terrorism-Strategy-2015.pdf (280)
Canada-National-CT-Strategy.pdf (280)
Icon_ (385119)
Kosovo-Strategy_for_Counter_Terrorism_2012-2017_eng.pdf (280)
Somalia-CT-Strategy.pdf (280)
UK-Government-Contest-Verson-June-2018.pdf (336)
US-counterterrorism_strategy-2011.pdf (336)
Others
DS_Store (280)
CNI Specific (280)
Emergency Planning (280)
FEMA Publications (280)
General Terrorism Publications (280)
Hostile Reconnaissance (280)
Hostile Vehicle Mitigation Specific (280)
Icon_ (385119)
Incident Reports (280)
Mail Threats (280)
Mass Gathering Specific (280)
Miscellaneous Physical Security Counter Terrorism Publications (280)
Miscellaneous Procedural Counter Terrorism Publications (280)
MTFA_ Active Shooter Specific (280)
NaCTSO CT Protective Security Publications (280)
National Level Counter Terrorism Strategy (280)
UNIT 11 - Protection of Information
Please scroll further down for the Unit 11 support documents.
ISMI CSMP Unit 11 Protection of Information v0718.1.pdf (1891214)
Annex 1.docx (158227)
Supporting Documents
Background Notes
11.1-Distributed-Denial-of-Service-Attacks.pdf (321451)
11.3-Trade-Secrets-in-the-US-and-the-DTSA-2016-Legislation.pdf (87049)
External Background Documents
Business Travel Information Security
Cyber-Tips-for-Travellers.pdf (820749)
Foiling-Cyberspies-on-Business-Trips-The-New-York-Times.pdf (3355068)
Guide-to-Protecting-US-Business-Info-Abroad.pdf (211051)
Traveling-with-Mobile-Devices-Trends-and-Best-Practices.pdf (1604012)
Cloud Security
The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf (971419)
Cyber Security Best Practice General
.DS_Store (8196)
10_steps_infographic-2015.pdf (664377)
10_steps_ten_critical_areas-2015.pdf (260538)
12-1119-cyber-risk-management-board-responsibility.pdf (2508782)
BCC-Digital-Survey-2017-Cybersecurity.pdf (174061)
cbi_cyber_security_intelligence_first.pdf (1229847)
Cyber-Security-guide_09102017.pdf (1548606)
Cyber-Security-Small-Business-Guide-NCSC-.pdf (1116315)
Cyber-Threat-How-to-Manage-the-Growing-Threat-of-Cyber-Attacks.pdf (2388539)
HMG-small-business-cyber-security-guidance.pdf (238744)
Intel-Prioritizing_Info_Security_Risks_with_TARA.pdf (469295)
ISACA-Information-Security-Govenance-for-Board-of-Directors-and-Executive-Management_res_Eng_0510.pdf (515853)
The-Data-and-Internet-Security-Guide-V2.pdf (2453581)
UK CESG 10-steps-to-cyber-security-executive.pdf (4337900)
UK-CESG-10-steps-to-cyber-security-executive-NXPowerLite-Backup-.pdf (3674257)
Espionage(General)
2018-US-Govt-Report-Foreign-Economic-Espionage-in-Cyberspace.pdf (2465034)
Information Security Best Practice General
ASIS-Guideline-Information-Asset-Protection.PDF (300974)
DTI-Guide-to-Business-Information-Security.pdf (48425)
DTI-Keeping-it-Confidential.pdf (65011)
DTI-Understanding-the-Risks.pdf (30819)
hipaainfosecuritytermsglossary.pdf (140188)
CISSP (ISC)2 Official Study Guide 7th Edition.pdf (39825094)
CISSP All-in-One Exam Guide, 7th Edition-McGraw-Hill(2016).pdf (83561950)
CISSP.CBK.Fourth.Edition.pdf (32426496)
Investigation and Incident Response
ACPO_guidelines_computer_evidence-1-.pdf (2790088)
ENISA-Good-practice-material-for-first-responders.pdf (995346)
NIST.SP.800-61r2-Computer-Security-Incident-Handling-Guide-.pdf (1480442)
IoT,Convergence and Migration of PPS to IP
175-000-IoT-cameras-can-be-remotely-hacked-thanks-to-flaw-says-security-researcher-ZD-Net.pdf (2039779)
Are-you-aware-of-the-threats-to-your-physical-security-system.pdf (175279)
Convergent_Sec_Risks_Physical_Sec_Systems.pdf (556698)
Cyber-Threats-in-Physical-Security-Understanding-and-Mitigating-the-Risk.pdf (228064)
How-hackers-will-exploit-the-Internet-of-Things-in-2017-Help-Net-Security.pdf (1879045)
The-Case-for-Integrating-Physical-and-Cyber-Security-WSJ.pdf (1395544)
The-Unstoppable-Convergence-of-Physical-Security-and-IT-and-Wha.pdf (220664)
What-are-the-common-vulnerabilities-of-IP-based-physical-securi.pdf (189569)
Media Sanitation
Icon_ (0)
NCSC-Secure-Sanitation-of-Storage-Media.pdf (75026)
Misc
Choosing-A-GoodChart-Dissected-FINAL.pdf (90081)
Miscellaneous Annual Reports
cyber_security_assessment_netherlands_2018.pdf (2060125)
infographic_cyber_security_assessment_netherlands_2018.pdf (600574)
Passwords
Perpetrators
Insider-Threat-Statistics-for-2019_-Facts-and-Figures-_-Ekran-System.pdf (919289)
NCA-Pathways-into-Cybercrime-2017-Report.pdf (1874819)
Verizon-insider-threat-report-executive-summary.pdf (2361958)
Personal Data Sepecifically
Icon_ (0)
US-DHS-Handbook-for-Safeguarding-Sensitive-PII_0.PDF (972395)
Supply Chain Security
Supply_Chain_Security_Collection_Jan2018.pdf (5889369)
WiFi
WiFi-Insecurity-Wired-Magazine.pdf (4001164)
Others
DS_Store (280)
Business Travel Information Security (280)
Cloud Security (280)
Cyber Security Best Practice General (280)
Espionage(General) (280)
Icon_ (340879)
Information Security Best Practice General (280)
Investigation and Incident Response (280)
IoT,Convergence and Migration of PPS to IP (280)
Media Sanitation (280)
Misc (280)
Miscellaneous Annual Reports (280)
Passwords (280)
Perpetrators (280)
Personal Data Sepecifically (280)
Supply Chain Security (280)
WiFi (280)
UNIT 12 - Protection of at-Risk Personnel
Please scroll further down for the Unit 12 support documents.
ISMI CSMP Unit 12 - Protection of at-Risk Personnel v919.pdf (1287021)
U12 Workbook v1114 RENAME BEFORE SUBMISSION ACCORDING TO INSTRUCTIONS.docx (54550)
Supporting Documents
cpg_101_comprehensive_preparedness_guide_developing_and_maintaining_emergency_operations_plans_2010.pdf (1783115)
Handbook-for-Journalists-Personal-Safety-.pdf (578374)
Background Notes
Active Shooter
ANCTZ-Active-Shooter-Guidelines-for-Places-of-Mass-Gathering.pdf (497316)
DHS-Active-Shooter-Response-Guide.pdf (1008180)
IAB-Improving-Active-Shooter-Hostile-Event-Response.pdf (568518)
Business Travel Security
AIG-Pre-Travel-Planning.pdf (927743)
CPJ-Journalist-Security-Guide.pdf (439426)
Golden_Rules_of_Travel.Travel_Safety_Management.Ebook.Intelligent_Travel.pdf (390120)
IOSH Managing the safety health and security of mobile workers.pdf (8904862)
K-R-Danger-Zones-Chartis.pdf (3159325)
Managing-Travel-Risks-Chubb.pdf (152211)
Operational-Security-Management-in-Violent-Environments.pdf (2266784)
OSAC-Security-Guidelines-for-Families-Overseas.pdf (385668)
The-six-major-risks-to-corporations-ass...ted-with-business-travel-Anvil-Group.pdf (983038)
Traveling-with-Mobile-Devices-Trends-and-Best-Practices.pdf (1542215)
Travel-Safety-Goes-Global-ASIS-Feature-Article.pdf (184303)
Kidnapping
PSNI-advice_tiger_kidnap.pdf (41172)
OHSGuidePreventingViolenceRobberyTheft.pdf (239723)
Petrol-Station-Robbery-Toolkit.pdf (2505680)
Portland-Police-Robbery-Prevention-Guide.pdf (348747)
GAO-Additional-Efforts-to-Protect-Healthcare-Workers-from-Violence.PDF (1457792)
HSE-Guidance-on-Workplace-Violence.pdf (565421)
US-DoJ-Workplace-Violence-1993-2009.pdf (639158)
WorkplaceViolence-Hospital-Example.pdf (1015169)
WORKPLACEVIOLENCEPREVENTIONPOLICY-westchester.pdf (238515)
Zero-Tolerance-Violence-Hospital-Notice.pdf (179446)