Cards 1-40 Flashcards

(40 cards)

1
Q

Risk is measured by: Determining the __________ in relation to the ____ and _____ associated with it.

V of the A
T and V

A

Determining the value of the asset in relation to the threats and vulnerabilities associated with it….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security risk rating = AV X TL X S of I X V

A

Security risk rating =

asset value x threat likelihood x Severity of incident x Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three categories of assets that are exposed to risk?

-P
-Np and
-L

A

Physical, non-physical and logical….

Physical:
- facilities;
- operational & industrial control systems &
- on-site processes and assets.

Non-physical:
- geo-political landscape;
- culture,
- speed of decision making and
- intensity of competition;

Logical:
- information & digital assets and
- the network or digital space that connects them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The risk assessment process should be revisited?

A

cyclically and continuously because of the elements that are constantly subject to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The purpose of a security survey?

A

-determine current seurity posture
-IDentify deficiencies and excesses,
-compare current SP with what would be appropriate; and
-recommend improvements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When considering vulnerabilities, what 8 factors should be addressed?

A

-lack of backup for critical functions;
-single points of failure;
-co-location of critical systems, organizations and components;
-inadequate preparedness for attacks;
- inadequate security
-too easy for an aggressor to attack the facility;
-presence of hazardous material
-potential for collateral damage from nearby companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security survey focuses more on vulnerabilities than a…..

A

Physical Security assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cost benefit analysis should be used in both a…….

A

Physical security assessment and a risk assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The five functions included in a functional approach to a physical security assessment include:

S A&E
SSM
CP…
ESS
SO and the HE

A
  • Security architecture and engineering;
  • Structural security measures;
  • C, P, T, E, D
  • Electronic Security Systems;
  • Security officers and the
    Human element
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Typical areas assessed in a physical security assessment include:

B, D, W, O
L, S and C
S, L, A and E systems
VT and PC

A

Barriers, doors, windows, openings;
-locks, safes and containers;
-signage; lighting; alarm and electronic systems;
-vehicle traffic and parking controls;
-visitor management;
-package handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Automated assessment tools should only assist in completing surveys because they…..

A
  • may give a false sense of knowledge;
    -may have a high cost;
    -may have complex software; and
  • they can’t capture unquantifiable characteristics.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Defense in depth?

A

An adversary must overcome a number of protective features in Sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why does each layer of security require a separate act by the adversary?

A

-causes Uncertainty in the perp’s mind;
-increases attack preparation time;
- adds steps to the intrusion and
-allows for more police or guard force response time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layered security should have i______ at each of the layers?

A

Interdependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Purposely left blank

A

Purposely left blank

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the principle of balanced protection?

A

-the protection system’s individual applications and components will be integrated and converged so that they provide an equal level of protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The appraisal component of the security survey involves…?

D_____ and c______ recommendations for e_______

A

Developing and communicating recommendations for enhancements.

18
Q

What is the focus of a physical security assessment?

A

The _______to the physical ______and _____of an organization and the _____ ______ (against any risk) that constitute the realm of physical security.

Risks
Assets
Property
Protection
Measures

19
Q

The physical security assessment could provide the basis for …what?

A C & IS analysis and RA
ID SG
ID a range of S and P&C and
Ass in the D of the O’s SRM C, R and RP

A

A comprehensive & integrated security analysis and risk assessment;
-identifying security gaps;
-identifying a range of Solutions and their pros and cons; and
-assisting in the development of the org’s security risk management
continuity, response and recovery programs.

20
Q

What costs are considered in a cost-benefit analysis?

T and T
P and P
O and O C C

A
  • Technology and time;
  • Process and personnel; and
  • Opportunity and Overall capability costs
21
Q

The 3 most common approaches to a physical security assessment?

A

Outside-inward approach;
Inside-Outward approach; and
Functional approach

22
Q

What is it called when the assessment team acts as the aggressor and moves from outside the facility through successive layers of security toward the asset?

A

Outside-inward physical security assessment approach

23
Q

When the assessment team acts as the defender and works from the asset out towards the outer perimeter it’s called….?

A

The inside-outward physical security assessment approach

24
Q

When the security assessment team evaluates security functions/disciplines and collates the findings from the assessment component it’s called?

A

The functional (security discipline) physical security assessment approach

25
The five criteria of a good security survey report?
Accurate Clear Concise Timely and Slant or pitch
26
The 6 objectives of physical access control include: Deny C/O A D A from U D In and P In D and M A In T IR from S/P
-deny covert/overt action; -distinguish authorized from unauthorized; -deter intruders and prevent intrusion; -detect and monitor actual intrusions; -trigger incident response from security/police;
27
An asset is anything with:
Tangible or intangible value
28
Risk-analysis is a process for identifying asset ______, _______ and _______ to determine ______. V, T and v to determine R
identifying asset values, threats and vulnerabilities to determine risks.
29
An asset’s criticality to a business is determined based on 2 things…….?
-based on the org’s mission/goals and ; -how the org would recover if the asset was no longer available.
30
Three steps to identify an org’s assets are: 1) define PBF 2) ID S/B in and s 3) ID the org’s T&IA
-Define Primary business functions; -ID site/bldg infrastructure and systems; and; -ID the org’s tangible & intangible assets.
31
The two types of costs considered when valuing an asset are?
Direct and indirect costs
32
Seven (7) factors to consider in valuing assets: IN related to FD IM on R and R As RC and AV of R R L bc of L F WHETHER there are BS CIV
- injuries related to facility damage - impact on revenue and reputation - Asset replacement costs and availability of replacements; - revenue loss BC of lost functions; - whether there are backup systems - critical information value;
33
When determining asset values, six direct costs are? LB, FL, VofG, H L And I C M T dealing w/Ev P C J Not C by IN
-Lost business, financial losses, value of goods; -higher labor and insurance costs -mgmnt time dealing with event; -punitive court judgements not covered by insurance
34
Indirect costs (9) of asset value determination include: NMC and CP, H PR, IN, and W Sh L for M PEM HT and WS
-neg media coverage and consumer perception; - higher PR costs to improve image, insurance costs bc placed in a higher risk category and higher wages to get workers; -shareholder lawsuits for mismanagement; -poor employee morale; higher turnover/ work stoppages.
35
What legal & regulatory procedures should be part of a physical asset protection program?
-identify the legal and regulatory schemes the org uses with its assets/activities/functions/products/services/stakeholders/supply chain; -determine how these schemes apply to its risks; -ensure these schemes are taken into account in establishing, implementing & maintaining its physical asset protection program.
36
Two types of assets include:
Tangible and intangible assets
37
Assets can be valued in two ways:
-assigned a relative value based on Priority and -apply a cost of loss formula;
38
What is the cost of loss formula to calculate an asset value:
K=(cp + ct + cr + ci) - i K= ttl cost of loss; Cp-cost of permanent replacement Ct-cost of temporary substitute; Cr - total related costs (removal and installation) Ci- lost income costs I- available insurance or indemnity
39
Two types of adversaries:
-one uses intrusion to get at an asset, and -one who attacks from outside
40
Two common physical security compliance metrics used in the public sector are: C of F C of S
-compliance of facilities and -compliance of systems