Chapter 1 Flashcards

1
Q

What is the Physical Security Professional (PSP) designation awarded for?

A

Demonstrating a comprehensive level of competence in physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can achieving the PSP designation provide you?

A

Respect, recognition, opportunities, and professional advancement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is physical security according to the study guide?

The In________ of P, P and E to s________ assets.

A

The integration of people, procedures, and equipment to safeguard assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are The Four Ds of physical security?

A

Deter, Detect, Delay, Deny.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it preferable to deter a criminal act in physical security?

A

To prevent the act from being attempted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the function of Detection in physical security?

A

To include Assessment to be effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When was the American Society for Industrial Security formed?

A

In 1955.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What were men assigned to do in larger cities and towns in terms of physical security in the past?

A

To act as ‘watchmen’ to monitor access points and alert citizens of attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three techniques a supervisor can use to ensure post orders are understood?

A

Ask specific questions,
observe in application,
set up hypothetical situations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do policies differ from procedures in security operations?

A

Policies are strategic objectives, while procedures are detailed instructions for daily work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four main areas that policies in security operations address?

A

General, People, Property, Information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three main areas that procedures in security operations address?

A

People, Property (post orders), Information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the responsibility of supervisors in the current trend of security force management?

A

Quality-Control (QC) and Quality-Assurance (QA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two measurable performance categories for security officers?

A

Response and training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give 2 examples of response metrics for security officers.

A

Guard force response time, and
Time to respond to customer requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define point security in terms of site control.

A

Point security focuses on individual buildings within a loosely controlled outer perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How is area security defined in relation to site control?

A

Area security refers to a site with a higher level of control at the perimeter and entry portals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are 5 key considerations when designing a site or facility?

Hm
AI D
U
NF
CP

A

• HM → Hazardous materials
• AI → Air intake design
• U → Utilities
• NF → Neighboring facilities
• CP → Contingency planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain the difference between performance criteria and feature-based criteria.

A

Performance criteria evaluate subsystems based on overall performance, while feature-based criteria rely on present features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do security programs typically assess the PPS effectiveness?

A

Many security programs use a combination of feature and performance criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are three contemporary challenges faced by security professionals?

S and G
E T
S E

A

Standards and guidelines,
emerging technology, and
security education.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What skills are required for protection officers in terms of technology?

A

Proficiency in computer programming,
managing technical platforms, and
multiple system usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a common security education standard for protection officers?

A

Certified Protection Officer (CPO) designation from the International Foundation for Protection Officers (IFPO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is the human element essential in a protection program?

For Q-D M and V A

A

Human element is necessary for quick decision-making and value addition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Explain the importance of security personnel in a protection program.
Despite costs, security personnel bring value and are critical to the organization's mission.
26
What is Defense-in-Depth also known as?
Layered protection or protection-in-depth.
27
Describe Defense-in-Depth concept in physical security.
Using multiple layers of security features to provide 360-degree protection without gaps.
28
What is the significance of balanced protection in Defense-in-Depth?
Each security layer should have equal protection around the asset.
29
The purpose of exterior perimeter security measures is to secure the outermost boundaries with L____, F_____ and ID_______.
To secure the outermost boundaries with lighting, fencing, and intrusion detection.
30
What are the 5 core assets protected by Defense-in-Depth strategies? M and O D VC P and P PS
Mailroom and onsite delivery Visitor controls Policies and procedures, password security.
31
How many main layers are typically used in a simple Defense-in-Depth approach?
Three main layers: outer, middle, inner.
32
What is the middle layer in Defense-in-Depth strategy?
Comprises the exterior of buildings and may include doors, windows, and walls.
33
Explain the concept of Inner layer in Security Defense-in-Depth.
Protects high-value assets with various security measures like access controls and surveillance.
34
What is the Design Basis Threat (DBT) used for in physical security (3 things)?
Identifies assets to be protected, Identifies adversary skills, and Identifies potential pathways used.
35
Define Critical Detection Point (CDP) in layered protection.
The point where detection and response time exceeds the time needed to compromise an asset.
36
What are the five elements to be considered in a physical security program design? FL PS SS OOp PM
Facility layout, protection strategy, security systems, officer operations, program management.
37
What are 8 characteristics a security officer should possess? Mighty Eagles Glide Calmly, Never Crashing.
• Mighty → Mentally stable and Mature (Emotionally) • Eagles → Ethical nature and Excellent character • Glide → Groomed (Neat appearance) and Guarded (Loyal disposition) • Calmly → Courageous and Composed (Discipline)
38
List three aspects of behavior a security officer should have.
Courtesy, restraint, interest.
39
What are 3 common tasks that a security officer may be required to perform? PP ER D P and VT
Protect property, enforce rules, direct pedestrian and vehicular traffic.
40
Why is the ability to perform well under stress essential for a security officer?
Some duties involve stressful incidents like fights between coworkers or active assailants.
41
What should a security officer focus on during a partial bomb evacuation?
Assist the evacuation by focusing on the floor involved with the suspected bomb.
42
What is a post log in the context of security officer duties?
A chronological record of events that occur at a single post each day.
43
Why is accurate record-keeping important for a security officer? To d a and in, In L and MS
To document activities and incidents, Inform leadership and maintain security
44
What should be included in a security officer's formal written reports?
Specific issues and information for leadership, communicated effectively and accurately.
45
Describe the difference between contract security officers and proprietary officers.
Organizations may use contract or proprietary officers, with proprietary offering more control, loyalty, and performance.
46
What is the equation used to summarize professional expertise?
Education + Training + Guided Experience = Development
47
What does a security officer's development depend on?
Dependent upon his or her supervisor.
48
What 4 skills are required for effective security leadership according to the notes?
Counseling, coaching, collaboration, and teaching skills.
49
What should training for security officers be based on….name 3 things? RR, CC and UA
Regulatory requirements, client contracts, union agreements, etc.
50
List a few benefits of training for security officers mentioned in the notes. Improved JP and M Reduced T and L
Improved job performance and motivation reduced turnover and liability.
51
What are some methods - 6 - mentioned for delivering training to security officers?
Distance-learning, on-the-job training, lectures, mentoring, job aids, and case studies.
52
Name 6 ways organizations can maximize their training budget according to the notes?
Use free government/community training, join professional organizations, share materials, purchase off-the-shelf programs, outsource, and seek grants.
53
What are four common topics that security officers train on according to the notes? WP V AS I and E
Workplace violence, active shooter, investigations, and ethics, etc.
54
What are the three kinds of orders that direct security officer operations mentioned in the notes?
General orders, Post orders, Special orders.
55
What are Post Orders also known as?
Standard Operating Procedures (SOPs).
56
Why is monitoring the security function metric important?
It provides insight into the security function's reputation and resource needs.
57
What 4 activities are important to track for the security function? ABI L or S C R, K R and P V
Access badge issuance, lost or stolen card requests, key requests, and parking violations.
58
What is the baseline compliance requirement for inward-facing training metrics?
100 percent compliance is required for inward-facing training metrics.
59
What are 4 examples of outward-facing training metrics? WVP and AST SA and IT S
Workplace violence prevention and active shooter training, security awareness, and IT security.
60
Why is it important to conduct customer satisfaction surveys for training?
To gather feedback and improve training quality based on participants' experiences.
61
What 5 things should be checked by the legal department regarding incident response procedures? LD Co with bp, p and l, and S P
Legal defensibility, compliance with best practices, policies and laws, and staff protection.
62
Explain the concept of foreseeability in security management.
Events or actions that may cause harm and were known or should have been known.
63
Define proximate cause as related to security officer responsibilities.
When an officer directly causes an injury to a victim.
64
What does breach of duty entail for security officers?
Engaging in unreasonable conduct and/or failing to adhere to duty guidelines.
65
What are some (3) benefits of using contract personnel as security officers?
Cost is usually lower than proprietary officers, more flexibility, and fewer administrative tasks.
66
When is a hybrid model of contract and proprietary security officers often used?
When seeking to benefit from positive aspects of both models.
67
What are the preemployment screening guidelines for security officers in terms of age for armed positions?
21 years of age.
68
What are some of the criteria for determining employment eligibility for security officers?
Legal working status, verifiable identity, previous addresses and phone numbers, high school diploma, criminal history check, verified employment history, and drug screening.
69
What are some (5) roles security officers fulfill during their employment? PR/MR EA IA LC and PSS
Public relations/management representative, enforcement agent, intelligence agent, legal consultant, and physical security specialist.
70
What 4 factors should be considered when deciding whether to arm a security officer? AL Cost to t, e and i, RR and P and P
Additional liability, Additional costs to train, equip and insure, regulatory requirements, and policies and procedures.
71
What responsibilities (5) does organizational management have when arming security officers?
Training, selecting firearms and ammunition, proper maintenance of firearms, maintaining records, and purchasing adequate liability insurance.
72
What are the three distinct learning domains that learning can be separated into?
Cognitive learning, affective learning, and psychomotor learning.
73
What are considerations for policies when arming security officers? Carrying of PO-W U-of-F conditions W and A types, Acc R and S of W, RK St and Re
Carrying privately-owned weapons, use-of-force conditions, weapon and ammunition types, accountability, return and storage of weapon, record keeping, standards and regulations.