ASIS PSP Exam Flashcards
(377 cards)
How is risk measured?
The value of the asset in relation to the threats and vulnerabilities associated with it.
How is security risk rating calculated?
Asset value rating X threat likelihood rating X security of incident rating X vulnerability rating = security risk rating.
Conditions that tend to increase assets’ exposure to the risk of loss can be divided into which categories?
Physical- includes factors such as the organization’s types and locations of facilities, the operational technology or industrial control systems, and the criticality of on-site processes and assets.
Non-Physical- Includes factors such as geo-political landscape, culture, speed of decision making, and intensity of competition.
Logical- Includes information and digital assets, and the network or digital space that connects them.
How often should the risk assessment process be revisited?
It should be a cyclical and continuous effort since the elements are constantly subject to change over time.
What is the purpose of the security survey?
- Determine and document the current security posture.
- Identify deficiencies and excesses in existing security measures.
- Compare the current posture with a determination of the appropriate level of protection needed.
- Recommend improvements in the overall situation.
What factors should be addressed with considering vulnerabilities?
- Lack of redundancy or backups for critical functions.
- Single points of failure.
- Collocation of critical systems, organizations, or components.
- Inadequate response capability to recover from an attack.
- Ease of an aggressor to access a facility.
- Inadequate security measures are in place.
- Presence of hazardous materials.
- Potential for collateral damage from other companies in the area.
What is the difference between a physical security assessment and a security survey?
A security survey focuses more on vulnerabilities.
Is a cost-benefit analysis used in a physical security assessment or in a risk assessment?
A cost-benefit analysis should be used in both.
What are the functions included in a functional approach to a physical security assessment?
- Security architecture and engineering.
- Structural security measures.
- CPTED
- Electronic security systems.
- Security officers and the human element.
What are typical areas to assess in a physical security assessment?
- Barriers, doors, windows, other openings
- Locks, safes, and containers, signage
- Alarm systems, lighting, electronic systems, security services, vehicle traffic, parking controls, utilities protection, visitor management, and package handling.
Why should automated assessment tools only be used to ASSIST in completing an assessment?
- May give a false sense of knowledge in security assessments.
- High cost.
- Complexity of software.
- Computers cannot factor in unquantifiable characteristics.
What is asset prioritization based on?
Each asset’s criticality to the organization’s mission and overall strategy.
What is the defense-in-depth approach?
An adversary must avoid or defeat a number of protective devices or features in sequence (i.e., peeling an onion).
Why does each layer of security require a separate act by the adversary?
- This causes uncertainty in the perpetrator’s mind.
- Increases attack preparation time.
- Adds steps to the intrusion.
- Allows time for a security or police response.
What is an important thing to consider when assessing layered security?
The interdependencies of each layer.
What is the principle of balanced protection?
The protection system’s individual applications and components will be integrated and conveyed so that they provide an equal level of protection.
What is involved in the appraisal component of the security survey?
Developing and communicating recommendations for enhancements.
What is the focus of a physical security assessment?
The risks to the physical assets and property of an organization and the protective/protection measures (against any risk) that comprise the realm of physical security.
The physical security assessment could provide the basis for what?
- A comprehensive and integrated security analysis and risk assessment across the organization.
- Identifying security gaps.
- Identifying the range of potential solutions and their advantages/disadvantages.
- Assisting in the development of organization security risk management, continuity, response, and recovery programs.
What costs should be considered in a cost-benefit analysis?
- Technology costs.
- Opportunity costs.
- Process impact costs.
- Time costs.
- Personnel costs.
- Overall capability costs.
What are three common approaches to a physical security assessment?
- Outside-inward approach (outward-inward approach).
- Inside-outward approach.
- Functional approach.
This physical security assessment approach occurs when an assessment team takes the role of the perpetrator and begins outside the facility focusing on the successive layers of security.
Outside-inward approach (outward-inward approach)
This physical security assessment approach occurs when an assessment team takes the role of the defender and works their way from the asset out toward the outer perimeter.
Inside-Outward Approach
This physical security assessment approach occurs when an assessment team evaluates security functions/disciplines and collates the findings from the assessment component.
Functional (security discipline) approach