Application, Design, and Integration of Physical Security Systems Flashcards
(139 cards)
What are the two foundational design principles?
The four Ds (deter, detect, delay, deny),
Layered security (defense in depth).
The point where the delay time remaining exceeds the response force time is known as what?
Critical Detection Point.
What is the term for the type of security where there is significant perimeter protection and entry is tightly controlled at a single portal?
Area security.
What is the term for the type of security where the outer perimeter is loosely controlled and the primary security focus is at an individual building or restricted area within?
Point security.
What are some conflicts that might arise in the design process for physical security measures?
Surveillance systems, sensors, door systems, and other access control measures may conflict with one another;
Safety and security objectives may not be the same;
Security goals may not align within organization’s mission or culture.
What concept is used in the security design process to describe all aspects – electronic, structural, human, and procedural - of a security system complementing and working with each other?
Balanced protection.
What is a key factor in the nature of the physical security design and strategy employed to meet protection objectives?
The type or use of the facility or asset being protected.
What are the two types of design criteria?
Performance criteria (elements chosen for their contribution to performance),
Feature criteria (elements chosen because certain features are required).
What type of design process selects elements and procedures according to the contribution they make to overall system performance?
Performance criteria.
What type of design process selects elements or procedures to satisfy requirements that certain items be present?
Feature criteria.
What are the five different aspects that need to be taken into account when developing security system procedures?
People,
Operations,
Maintenance,
Training and awareness,
Incident-based and exploratory investigations.
What are the nine basic factors to know from the onset in security design?
Governing codes and regulations,
Protection requirements,
Company, standards and guidelines
Type of construction,
Site layout,
Material selection,
Utilities,
Life safety,
Infrastructure.
What equation is used for calculating risk when developing a design?
Risk = Vulnerability X Threat X Asset Value
According to the US federal emergency management agency (FEMA) model, what are the two basic classifications of threats or hazards?
Natural and human-caused.
What is the design bases threat (DBT)?
A profile of the type, composition, capabilities, and methods (tactics, techniques, and procedures), as well as the goals, intent, and motivation of an adversary, upon which the security engineering and operations of a facility are-based.
What is a requirements document?
A requirements document identifies the primary reasons for implementing new measures or upgrading an old system. It is closely tied to the risk assessment by identifying the specific security measures to mitigate threats and reduce vulnerabilities.
The collection, review, and analysis of data relative to the facility where the system will be implemented is an integral part of which process?
Planning process.
What are the two important criteria in developing the objectives for implementing or upgrading the physical protection system (PPS)?
The objective must be clearly stated and it must be SMART.
What does SMART stand for?
Specific, Measurable, Aggressive but achievable, Realistic, Time-bounded (Source: IPPS)
Specific, Measurable, Attainable, Repeatable, Time-dependent (Source: PSP)
Other variations on these initials maintain the essential idea: that objectives, be clear, focused, and appropriate to the task.
What are some influencing characteristic factors to consider in physical security design?
Assets, under protection,
Building or facility type,
Surroundings,
Location,
Additional concerns, such as management support and resources.
According to CPTED security layering, where is the first layer of security?
The first layer should be at the perimeter of the property.
According to CPTED security layering, where is the second layer of security?
The second layer should be at the building exterior.
According to capital CPTED security layering, which layers are inside the building?
The third, fourth, and fifth layers.
The third layer should segregate authorized an unauthorized visitors.
The fourth layer should segregate generally accessible client areas from staff-only areas.
The fifth layer should further restrict staff access to highly sensitive areas.
What is crime prevention through environmental design (CPTED)?
An approach to reducing crime or security incidents through the strategic design of the built environment, typically employing organizational, mechanical, and natural methods to control access, enhance natural surveillance and territoriality, and support legitimate activity.