Chapter 2 Flashcards
What are the three approaches to performing a security survey?
Outside-In Approach,
Inside-Out Approach,
Functional (Security Discipline) Approach
What is a SWOT Analysis used for in the security survey process?
To focus on Strengths, Weaknesses, Opportunities, and Threats.
How can outside support like consultants benefit the risk assessment process?
By providing a fresh perspective, collective knowledge, and regulatory compliance assistance.
What four tests should be considered during the security survey process?
S and R C
I D A
C L S
A C
• S and R C → Shipping and receiving controls
• I D A → Intrusion detection alarms
• C L S → Computer lab security
• A C → Access controls
What criteria should the security survey report adhere to?
Accurate, clear, concise, timely, considerate of slant or pitch.
What is the goal of a security survey in relation to leadership?
To provide A I for informed D-M R R
To provide actionable intelligence for informed decision-making regarding risk.
How can automated assessment tools assist in security surveys?
By processing, analyzing, comparing, and storing large amounts of data efficiently.
Define risk management.
The S process of id_____, ca_____ and mi_______ risks to an AL
Risk management is the systematic approach of identifying, calculating, and minimizing risks to an acceptable level.
What is the main objective of security?
To m____ risks by b_____ P____ M_____ costs with b______.
To manage risks by balancing protection measure costs with benefits.
What are the three categories in which assets can be divided?
Tangible assets, intangible assets, and mixed assets.
How can assets be valued?
Assets can be valued using 1) relative value based on priority or 2) the Cost-of-Loss Formula.
What does the basic Cost-of-Loss Formula consist of?
The Cost-of-Loss Formula consists of Cp, Ct, Cr, Ci, and I, yielding the total cost of loss.
What is one method to prioritize assets based on security risk?
Security risk can be calculated and used to rank or prioritize each asset.
How many steps are involved in the risk assessment process?
The risk assessment process involves six basic steps.
What are the initial steps in the risk assessment process?
The initial steps include identifying and valuing assets, identifying threats, and determining vulnerabilities.
What is the goal of risk management programs in organizations?
The goal is to develop a comprehensive protection strategy based on sound practices.
What formula is used to determine risk results?
Threat x Vulnerability x Impact /3 = Risk
Why is multiplication used instead of addition in the Risk Formula?
To determine the value; each element is scaled from 0-100.
How is overall risk placed back on a 0 to 100 scale?
By using the cubed root in the risk formula.
What is the goal of risk analysis?
To provide management with decision-making information.
Why is it important to prioritize risk based on criticality?
Because it is not practical to eliminate all risk.
What three things should be considered when determining protective measures?
BC
AR and
AE
Budgetary constraints,
available resources, and
adverse effects.
What 3 things must a physical security professional consider when selecting protective measures?
Ty of th,
Ad’s Soph and
Cap……
The types of threats and
The adversary’s sophistication, and
capabilities.
Why should physical security measures be scalable and agile?
To constantly evolve and improve in a changing environment.