ccccccc Flashcards

(53 cards)

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is physical security?

A

The practice of protecting organizational assets like people, property, and information through a combination of security measures including personnel, procedures, technology, and structures. [cite: 1]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the origins of physical security?

A

Its origins trace back to early human history, where simple tools like weapons and stones were used for protection against dangerous animals and outsiders. [cite: 2]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What forms the foundation of a robust physical security program?

A

Clearly defined objectives and meticulously chosen components. [cite: 3]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do security professionals effectively safeguard organizational assets?

A

Through a well-coordinated, multi-faceted approach utilizing the right combination of personnel, procedures, technologies, and structures. [cite: 4]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is aligning physical security measures with an organization’s culture, mission, and cross-departmental objectives essential?

A

To avoid internal conflicts and enhance operational efficacy. [cite: 5]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key activities of physical security professionals?

A

They assess security needs, identify internal and external threats to assets, and formulate plans, policies, procedures, and other security measures to mitigate those threats. [cite: 6]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary objective of protecting personnel in physical security?

A

Ensuring the protection of every staff member from any external or internal threats. [cite: 7]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provide an example of personnel protection in physical security.

A

Office buildings with secured entrances accessible only through ID cards or biometric systems, which enables monitoring and control over who enters or exits, providing physical safety to employees. [cite: 8, 9] Many companies also employ security staff for patrolling during non-working hours to deter unauthorized intrusion. [cite: 10]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is the protection of physical assets important?

A

Physical assets like office spaces, equipment, and machinery are indispensable business resources that require protection against theft or damage. [cite: 11]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provide an example of physical asset protection.

A

A manufacturing plant using CCTV cameras for round-the-clock surveillance of expensive machinery, allowing quick detection of abnormal activities to prevent significant damage. [cite: 12, 13]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is physical access restriction vital for information assets, even with cybersecurity?

A

It restricts unauthorized access to sensitive data stored physically, such as paper documents in locked areas or data centers. [cite: 14]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provide an example of protecting information assets physically.

A

In banks, measures include strong safes, fireproof filing cabinets, and electromagnetic shielding to prevent wireless extraction from servers behind biometrically controlled doors, protecting data files against theft, arson, and industrial espionage by insiders. [cite: 15]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Business Continuity Management (BCM) in the context of physical security?

A

Drawing up plans during a crisis (e.g., natural disasters, fire, burglary) to allow the organization to continue functioning by minimizing disruption to normal business operations. [cite: 17]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Provide an example of BCM.

A

Businesses in geologically unstable regions should have clear evacuation routes and robust emergency response plans. Building retrofitting can also significantly reduce risk if an earthquake strikes. [cite: 18, 19]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three key design concepts for an effective physical security program?

A

Four D, defense in depth, and balanced protection. [cite: 20]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe the “Deter” principle of the Four D design concept.

A

The primary goal is to discourage criminal activity before it begins, achieved through visible security measures and proactive strategies. [cite: 21, 22]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe the “Detect” principle of the Four D design concept.

A

If deterrence fails, the next step is to identify potential threats or breaches, involving monitoring systems and procedures to detect unusual activity. [cite: 23, 24]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe the “Delay” principle of the Four D design concept.

A

Once a threat is detected, actions are taken to slow down an attack or breach, giving time for a response force to intervene. [cite: 24]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe the “Deny” principle of the Four D design concept.

A

The final objective is to prevent unauthorized access to assets, thereby preventing the attacker from achieving their goals. [cite: 25]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How must the Four Ds be implemented to achieve comprehensive protection?

A

In sequence. If deterrence fails, detection and assessment become essential for initiating timely responses, and detection should always include assessment to fully understand the nature of events or breaches. [cite: 26, 27, 28]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Defense-in-Depth in physical security?

A

Also known as layered protection or protection-in-depth, it is a strategy used to create multiple layers of protection around a property or asset, so if one layer fails, others still provide protection, making it harder for an intruder to succeed. [cite: 29, 30]

23
Q

Describe the “Outer Layer” in Defense-in-Depth.

A

This is the first line of defense, including barriers like fences, gates, and lighting, which help deter or detect potential intruders before they get close to the building. [cite: 31, 32]

24
Q

Describe the “Middle Layer” in Defense-in-Depth.

A

This layer focuses on the building’s exterior, such as doors, windows, and walls, designed to prevent or delay unauthorized access once an intruder has bypassed the outer layer. [cite: 33, 34]

25
Describe the "Inner Layer" in Defense-in-Depth.
This is the most critical layer, protecting the interior of the building where valuable assets are kept. It includes reinforced barriers, security alarms, surveillance systems, and access control measures, designed to secure the most sensitive areas even if outer and middle layers are breached. [cite: 35, 36, 37]
26
What is the benefit of layering security measures?
It makes the overall security system more robust and resilient, minimizing the risk of a successful breach. [cite: 38]
27
What is crucial for assessing the effectiveness of each security layer?
Understanding the assets being protected, and the skills, tools, tactics, and potential pathways of potential adversaries, in terms of deterrence, detection, delay, and denial. [cite: 39, 40]
28
What is "balanced protection"?
Each layer should provide equal levels of security around, above, and below the asset. [cite: 41, 42]
29
What is the difference between Point Security Design and Area Security Design?
Point security design focuses on securing individual buildings or specific areas within them, emphasizing safeguarding specific areas rather than controlling a large perimeter. [cite: 43] Area security design aims to create a comprehensive security system at the outer perimeter and entry points, protecting vast spaces with sophisticated, reliable security features. [cite: 44]
30
What do professional security experts critically analyze when evaluating physical security?
Individual design components and the complete Physical Security System (PSS). [cite: 45]
31
What are the two primary evaluation methods for physical security design criteria?
Performance-centric criteria and feature-centric criteria. [cite: 46, 48]
32
Describe Performance-centric criteria with an example.
This method assesses subsystems or elements based on their contribution to the overall efficiency of the PSS. [cite: 47] Example: Having a fence sensor capable of identifying climbing, cutting, tunneling, and bridging under all environmental conditions. [cite: 47]
33
Describe Feature-centric criteria with an example.
This method evaluates based solely on the existence of certain features without necessarily considering their functionality. [cite: 49] Example: Mounting an outdoor surveillance camera without checking its viewing range or operationality under different scenarios. [cite: 49]
34
Do security systems use a single evaluation method?
Many security systems use both feature-centric and performance-centric criteria to assess the effectiveness of the PSS. [cite: 50]
35
What should an ideal security plan emphasize in its approach?
A holistic approach, seamlessly integrating different components rather than appearing as a disorganized collection of security measures. [cite: 51]
36
What are the four key components of physical security?
Security personnel, security procedures, security technology, and security structures. [cite: 52, 53, 54, 55, 56, 57, 71]
37
What is the role of security personnel in controlling access to premises?
Managing entry points to ensure only authorized individuals gain access, using and overseeing access control systems (access cards, biometric devices), and maintaining physical barriers like fences and electronic turnstiles. [cite: 58, 59, 60]
38
How do security personnel monitor people, areas, and events (surveillance)?
Operating surveillance tools like CCTV cameras and drones for continuous monitoring and suspicious activity detection, and conducting regular patrols to deter threats and ensure security systems function correctly. [cite: 61, 62]
39
What are the responsibilities of security personnel in managing incidents and emergencies?
Developing and updating emergency protocols (natural disasters, fires), ensuring staff are trained, addressing workplace violence through prevention strategies, mental health programs, training, and team-building, and ensuring fire protection through equipment maintenance, drills, and clear escape routes. [cite: 63, 64, 65]
40
What is involved in security personnel investigating incidents and reporting findings?
Thoroughly examining incidents to determine cause and impact, gathering information to prevent future occurrences, and preparing/submitting detailed reports to management for review and action. [cite: 66, 67]
41
How do security personnel ensure compliance with policies and procedures?
Conducting regular checks and audits to ensure adherence to company policies and procedures and addressing violations promptly, and performing regular security audits and reviews to assess effectiveness and adjust protocols for new threats. [cite: 68, 69]
42
What is the overall importance of security personnel?
They are essential in maintaining the safety and security of a facility, observing and monitoring activities to identify and address suspicious behavior, managing access to restricted areas, responding effectively to emergencies, and accurate reporting of incidents. [cite: 73, 74, 75, 76, 77, 78]
43
What are security policies and procedures?
Formal documents that establish rules and guidelines for maintaining security within an organization, addressing aspects like access control, visitor management, and security technology utilization to ensure systematic and effective implementation. [cite: 79, 80]
44
Why must security policies and procedures be regularly reviewed and updated?
To accommodate changes in the threat environment, organizational requirements, and technological advancements. [cite: 82]
45
How does security technology contribute to physical security?
It plays a pivotal role in safeguarding assets, facilities, and personnel, enhancing the ability to prevent, detect, and respond to various threats, creating a comprehensive security framework. [cite: 83, 84]
46
Name and describe a common security technology component.
CCTV Cameras: Integral to modern security systems, providing continuous surveillance and recording of activities within and around a facility. [cite: 86]
47
Name and describe another common security technology component.
Alarm Systems: Designed to detect unauthorized access or breaches, typically including sensors and alarms that alert security personnel to potential threats for rapid response. [cite: 87, 88]
48
Name and describe a third common security technology component.
Access Control Systems: Manage and regulate entry to restricted areas using technologies like key cards, biometric scanners, and electronic locks, ensuring only authorized individuals gain access. [cite: 89, 90]
49
Why is the effective integration and management of security technologies essential?
For creating a cohesive and robust security infrastructure, with regular maintenance, updates, and coordination ensuring the system remains effective and adaptable to evolving threats. [cite: 91, 92, 93]
50
What are security structures?
Crucial for establishing protective barriers around a facility. [cite: 94]
51
Provide examples of security structures and their purpose.
Perimeter fencing (first line of defense, deters unauthorized access, defines boundaries)[cite: 95], gates (controlled entry/exit points)[cite: 96], high-security locks (secure sensitive locations)[cite: 97], and security lighting (enhances visibility, deters intruders, assists surveillance)[cite: 98].
52
How do security structures contribute to the overall security system?
They form the backbone of a security system, offering physical protection that complements technological measures, working with surveillance and access control systems to fortify overall security. [cite: 99, 100]
53
What is essential for adapting to evolving threats and maintaining a secure environment regarding security structures?
Regularly assessing and maintaining these structures. [cite: 101]