Cards 41-80 Flashcards

(40 cards)

1
Q
  1. Two reasons to collect physical security program metrics:.
A

-provide assurance of program effectiveness

and

-facilitate improvements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Commonly provides management with a snapshot of the effectiveness and efficiency of a physical security program?

A M S C

A

A metrics summary chart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The purpose of a business impact analysis (BIA)?

Is to id______ and ev______ the potential impact of a ________ to operations.

A

Identify and evaluate the potential impact of a disruptive event to operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The purpose of a business continuity management system (BCMS)….?

A

Enable a company to address Disruptive events by identifying, developing and implementing …C….O….P, P and P…..capabilities, objectives, policies, processes and programs within legal bounds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What two things are the foundation for setting up business continuity objectives, targets, programs and plans?

The _______and the ______

A

The business impact analysis and the risk assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Name 3 inter-related management response steps that require pre-emptive planning and implementation in case of a disruptive or crisis event?

ER
CP
RP

A

Emergency response;

Continuity planning; and

Recovery planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is the basis for setting recovery time objectives?
A

-The results of the business impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What is a disruptive event?
A

An event that is planned or not planned that interrupts activities, operations or functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What is a threat?
A

-The potential cause of an unwanted incident which may harm…
Individuals;
Assets;
A system
An organization
The environment or
The community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is a loss event profile?
A

-a list of the kind of threats affecting the assets to be safeguarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What is a hazard?

A source of PD or AC…..ass with _________

A

A source of potential danger or adverse condition. They are generally associated with nature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Threats or loss risk events fall into three categories:

Cr
N-C, MM I or ND
EC by R with other O

A

-Crimes
-non-criminal man-made incidents or Natural disasters
- events caused by an org’s relationship with other orgs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Two examples of non-criminal threats?

NT
MMT

A

Natural threats - hurricane, tornado, storm;

Man-made threats and disasters…..like a plane crash….labor strike or power failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Six examples of peripheral systems and interfaces?

LSS and P&P
BC and IT in
LR and OS

A

Life safety systems and policies and procedures;
Building controls and IT Infrastructure;
Liaison relationships and outsourced services;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What is a consequential event?
A

-An event that occurs b/c of a relationship between events or between two organizations. The company suffers a loss b/c of that event or relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. How is the probability of a threat occurring decided?

By considering the l______ that a L______ R_____ E______ may occur…..

A

-by considering the likelihood that a loss risk event may occur in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. What factors determine the probability of a threat?
A

Historical
Geographical
Political
Economical and
social conditions

18
Q
  1. What is a vulnerability?
A

Any weakness that can be exploited by an aggressor/terrorist or criminal that makes an asset susceptible to damage from Natural hazards or consequential events.

19
Q
  1. The 8 Factors to consider in assessing asset vulnerability?

L of B
SP of F
Co-l of KS
In RC From A
In SM
E of AA to a F
HM
P for CD from OC

A
  • lack of backup;
  • single point of failure;
  • co-location of key systems;
  • inadequate response capability from attacks
  • inadequate security measures
  • Ease of aggressor access to a facility;
  • presence of hazardous materials;
  • potential for collateral damage from other companies.
20
Q
  1. Four levels of risk?
A

Catastrophic;
High’
Moderate; and
Low

21
Q
  1. What level of risk requires treatment at any cost?
22
Q
  1. The level of risk that cannot be further reduced w/o an expenditure of costs disproportionate to benefits is?
23
Q
  1. The level of risk that is negligible or can be managed with routine procedures?
24
Q
  1. The level of risk where the org is prepared to pursue/ retain or take based on informed decisions?
25
65. What should occur in relation to a regular review of the physical security assessment report?
-Monitor and follow up on the assessment findings, observations and recommendations.
26
66. Two categories of threats?
Man-made threats and Natural threats
27
67. This metric measures external dependencies responsiveness in meeting a security department request?
External dependency responsiveness
28
68. Physical security design attributes include: T of Ad & T to get to I A D that S D the A # and type of D IN/OUT S, S and E of the RF
-type of adversary and time required for him to get to inside assets; -delays that slow down the attack and number and type of detectors inside and outside a facility; and - Size, strength, and Equipment of the response force
29
69. Risk assessment is….?. A SP for E the E of U on Ac an E’s Ob…..
-A systematic process for evaluating the effects of uncertainty on achieving an enterprise's objectives
30
70. The goal of a cost benefit analysis? To ______ the ________ Lvls of ____ _______ at the best ______ value
-To identify the optimum levels of risk reduction at the best available value.
31
71. The analysis method that uses comparative values and not numbers?
Qualitative
32
72. An analysis method that uses numeric measures to describe value of assets, level of threats, vulnerabilities, impact or loss events?
Quantitative
33
73. Qualitative analysis is most suited to …..?
-evaluating basic security applications
34
74. What is a SWOT analysis/
-a business analysis method that involves strategic evaluation of key internal and external factors.
35
75. SWOT stands for?
Strengths Weaknesses Opportunities and Threats
36
76. External factors in a SWOT analysis include:
Opportunities and threats
37
77. Internal factors in a SWOT analysis include:
Strengths and weaknesses
38
78. What is the annual loss expectancy? The product of the C of II and the F of O
-the product of the cost of incident impact and the frequency of occurrence
39
79. What 6 state and local requirements should be considered for security projects? CR and St Tr and In Be Pr Pe and Co Re
Code regulations and standards; Trade and industry best practices Permitting and contracting requirements;
40
80. What conditions affect the likelihood of occurrence? P, S, P environments P and P C C
Physical environment; Social “ “ Political. “ “ Procedures and processes; Criminal capabilities