Design and Evaluation of PPS - Mary Lynn Garcia Flashcards

(285 cards)

1
Q

Acceptance Testing

A

performance of all necessary testing to demonstrate that installed equipment will operate in accordance with design plans and specifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control

A

process of managing databases or other records and determining the parameters of authorized entry such as who or what will be granted access, when they may enter and where access will occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control Measures

A

hardware and software features, physical controls, operating procedures, administrative, procedures and various combinations of these designed to detect or prevent unauthorized access to classified information, facilities or materials and to enforce utilization of these measures to protect security and property interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A C & D

A

Alarm Communication and Display - Refers to an integrated system of people, procedures and equipment that collects alarm data and presents the information in a manner that promotes rapid assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Acknowledge

A

to indicate the reception of an alarm signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Activated Delay

A

any technique that delays and adversary and depends on a sensor to initiate the delay mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Activated Denial

A

any technique that denies access to a target and depends on a sensor to initiate the denial mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Active

A

refers to a communication link that carries a continuous signal allowing immediate detection of a break in the link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Active Infrared Sensor

A

an active intrusion detection sensor that emits infrared light and detects blockage of light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Active Lines

A

scanning lines in the raster that contain video information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Active Sensor

A

an intrusion detection sensor that emits a signal from a transmitter and detects changes in or reflections of that signal by means of a receiver- passive sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Actual Force

A

force consisting of a physical act, especially a violent act directed against a robbery victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Actual Threat

A

a credible situation or validated information indicating that facility interest are currently or will be at risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Adversary

A

a person performing malevolent acts in pursuit of interests harmful to the facility - may be an insider or outsider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adversary Action

A

a specific act performed by an adversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adversary Action Sequence

A

a required/ordered series of acts performed by an adversary to achieve their objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Adversary Capabilities

A

attributes of the adversary, such a knowledge, motivation, and access to equipment that compromise a measure of his/her ability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Adversary Class

A

adversaries are generally classed as insiders or outsiders, depending on whether they are working inside a facility or must start an action sequence from the outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Adversary Neutralization

A

the termination but the facility guard force of an attack such that the adversary is captured, killed or forced to flee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Adversary Path

A

an ordered collection of actions against a target that if completed results in successful theft or sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Adversary Sequence Modeling

A

using an analytical model to estimate the probability of success of an adversary along a specific path or sets of paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Adversary Task

A

a specific act the adversary must perform in order to advance along a path - penetrate a barrier, travel a certain distance etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

AFC

A

Automatic Frequency Control - (video /CCTV) An AFC circuit is used to maintain an oscillator at a specified frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

AGC

A

Automatic Gain Control - (video/CCTV) used to maintain an output signal at a constant level over a limited range of input signal levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Alarm
a warning from a sensor or sensor system that a sensor has been triggered or activated, usually signalled by light or sound, may indicate a valid, false or nuisance alarm
26
Alarm Assessment
process of determining an alarm condition status, appraisal of the credibility, reliability, pertinence, accuracy or usefulness of an indicated alarm.
27
Alarm Priority Scheme
a technique or presentation for dealing with alarms from a combination of sensors in a local order. Alarm presentation sequence based on importance or seriousness of alarm.
28
Alert
communication that informs all personnel of a facility emergency and of the location of the emergency
29
Analog signal
a signal that attains an infinite number of different amplitude levels as opposed to one that can attain only a finite number of levels as a function of time.
30
Angular Field of View
the measure of the the field of view of a lens or surveillance camera lens combination expressed in degrees
31
Annunciator
an electrically controlled signal board or indicator primarily used for alarm presentation to guard forces
32
Aperture
The lens opening that determines the amount of light that will pass through the lens and onto the image plane
33
ASD
Adversary Sequence Diagrams - a graphical display path that an adversary might take to accomplish his/her objective
34
Assess
to determine the validity and response to an alarm signal
35
Assessment
the determination of the cause of an alarm and information regarding the threat
36
Assessment Zone
the volume of space in which assessments are possible
37
Attack
an attempt by an adversary to defeat the physical protection system and achieve his or her objectives. Tactics include: force, deceit, stealth, used alone or in combination
38
Authentication Code
a code known only to members of the response force.
39
Auto-iris Lens
a lens whose aperture is controlled by monitoring the video signal amplitude and automatically adjusting the iris to maintain a constant video amplitude output
40
Automated Access Control
electronic or electromechanical system used to authorize movement of personnel, vehicles or materials through entrances and exits of secured areas. Auth obtained by personal id info, computer comparison with data against authorized user list, computer activation of unlock mechanism is user has auth access
41
Background Noise
the total system noise, independent from the presence or absence of a signal. Signal not included as part of the noise
42
Balanced Line
a video transmission line whose impedance to ground from either side is equal (124ohms)
43
Bandsplitting (Frequency scrambling)
common analog voice-scrambling technique that involves partitioning of an audio channel into several separate frequency bands that are transposed and interchanged before transmission
44
Biometric Device
automatic device that can verify an individual's identity from a biological measurement or feature
45
Bistatic
an active intrusion detection sensor where transmitter and receiver are not side by side (collocated) in the same unit. They are separated.
46
Blackmail
extortion by threat
47
Blinding
reduction of scene information from high light levels entering the lens
48
Blooming
loss of detail in a video picture due to excessive bright spot displayed on flourescent screen
49
BMS Balanced Magnetic Switch
an intrusion sensor usually used to indicate a door opening. Switch is activated but the movement of a magnet mounted on the door
50
Bridging (looping) lnput
a high impedance intermediate termination of a signal line at the input of an amplifier, monitor or video switcher where the signal line must continue on to other equipment. Allows several pieces of equipment to use a common video signal without loss of signal amp
51
Brightness (luminance)
the attribute of visual perception in which an area appears to reflect or emit light, measured in foot-lamberts
52
Broadband
wide bandwidth transmission system with a single carrier and multiple information channels. Fiber-optic or RF
53
Broadband Jamming
simultaneous jamming of many adjacent frequencies by on high power jamming signal
54
Buffer
a data area shared by hardware devices or program process that operate at different speeds or with different sets of priorities. Buffer is a midpoint holding place. Exists to support the coordination of separate activities as opposed to accelerating the speed of the activity
55
Buried Line Sensor
a passive intrusion detection sensor that employs a buried transducer to detect seismic or magnetic disturbances
56
Burned-In Image
an image that persists in a fixed position in the output signal of a camera tube after it has been turned to a diff scene
57
Bypass
a sensor defeat mode in which an intruder defeats a sensor by avoiding detection
58
CCD Charge Coupled Device
a semiconductor device that is used as an optical sensor and stores charge and transfers it sequentially to an amplifier and detector
59
CCTV Closed Circuit Television
a tv system in which the signal distribution is limited or restricted, usually by cable
60
Classification
the positive assessment that a detected object is human, animal or some other object
61
Clear-voice
normal radio transmissions that have not been scrambled or encoded
62
Clear zone
an area within the storage site perimeter and around the boundary of the storage site free of obstacles. Area is designed to facilitate detection and obs of an intruder
63
Coaxial Cable
a cable consisting of a single conductor surrounded by and insulated from a metallic shield. Used for transmission of video based band
64
Coercivity
measure of resistance of a magnetic material to changes int he stored info when exposed to a magnetic field.
65
Collusion
secret agreement between two or more persons for a fraudulent, secret, illegal or malevolent purpose.
66
Common mode
signals or signal components that are identical in amplitude, duration and time
67
Communication
the transmitting or interchanging of information including alarm signals to central processing station and transmission of response info to security personnel
68
Communication System
the equipment and procedures used but he security force for sending and receiving messages
69
Complementary Sensors
sensors selected for combination because of their capabilities of mutually providing what the other lacks in terms of probability of detection, nuisance alarm rate and vulnerability to defeat
70
Containment
physical barriers that restrict or control the movement of or access to nuclear material
71
Continuous Detection
on a protected perimeter, no detection gaps occur in the detection zones of any of the sensor lines included in the perimeter subsystem
72
Contraband
material such as firearms, explosives, of material not permitted to leave a particular area.
73
Contrast
the ration of light and dark portions of a video picture
74
Control track
the area on the tape containing a recording used by servomechanism to control the longitudinal motion of the tape during playback
75
Covert Sensor
an intrusion detection sensor that is hidden from view, such as buried underground and does not radiate any signal detectable from outside the perimeter
76
CPU Central Processing Unit
the microprocessor in computers that provides the computing power
77
Crawl Test
crawling through an intrusion sensor's expected detection zone to determine if it is working properly
78
Crossover
the point at which the centre lines of 2 overlapping microwave sensor beams intersect
79
Cross-talk
undesired transfer of signals between systems
80
CRT Cathode Ray Tube
a display tube used in tv sets and CCTV monitors
81
Deadly Force
force that a reasonable person would consider likely to cause death or serious physical injury that could lead to death
82
Dead spot
gap in communication system coverage, radio coverage
83
Dead Time
the length of time between 2 successive uses of the line by a particular sensor in a dime-division, multiplexed sensor system
84
Deceit
attempt to defeat a security system using false id.
85
Defeat
prevent someone from accomplishing their goal. Bypassing a sensor or system of access
86
Delay
element of PPS to impede penetration into or exit of protected area
87
Denial
the effect achieved by safeguards and security systems that impedes or hinders intruder from gaining access to a protected space
88
Deployment
actions of the protective force from the time communication is received until the force is in position to neutralize the enemy.
89
Depth of Field
the maximum distance from a CCTV camera lens that 2 objects may be separated in a given lens field of view and still maintain image focus of both objects
90
Detection
determing that an unauthorized action has ocurred/ocurring. Sensing the action and assessing the alarm. Not complete without assessment
91
Detection and Assessment
the element of a PSS to discover and verify an unauthorized intrusion attempt
92
Detection Zone
an area under surveillance by one or more intrusion detection devices from which an alarm is produced when subject to a condition for an alarm
93
Deterrence
discouraging an adversary from attempting an assault by making assault appear very difficult to accomplish
94
Digital Encryption
the conversion of the analog voice signal to a digital signal in the system transmitter and the encoding of each bit of the digital data stream
95
Digital Signal
a radio signal made up of a series of digital pulses produced by one current or voltage value
96
Distribution Amplifier
a wideband amplifier having a single imput and several outputs for driving multiple signal lines
97
Diversion
an attack that draws the atention of an enemy from the point of principal operation
98
Doppler Effect
the change in frequency of sound/electromagnetic energy due to the motion of the object emitting/reflecting sound/electromagnetic
99
Due Diligence
diligence reasonably from and excercised by a person who seeks to satisfy a legal requirement or obligation. Exercised to escape liability
100
Duress code
a prearranged word or phrase that covertly indicates they are acting unwillingly
101
Duress System
a system that can covertly communicate response to a security control center
102
Dynamic
active comms link that generates a continually changing signal to rpresent the secure condition
103
EASI - Estimate of Advisory Sequence Interruption
A dynamic analytical computer model
104
ECD - Electron Capture Detector
A passive explosive vapor detector
105
Effectiveness Evaluation
an analysis of the capabilty of a physical protection system to defeat an attack
106
Electric-field Sensor
an active intrusion detection sensor that generates an electric field and senses changes in capacitance caused by an intruder
107
Element
distinct part of physical protection system
108
Embezzlement
stealing of $ or property bh employee to whom it has been entrusted
109
EMI - Electromagnetic Interference
Disturbances of equipment operation caused by electromagnetic fields from outside sources
110
Encryption
Digital comms - encoding an intelligible binary data stream to prevent unauthorized eavesdropping of radio transmission
111
End Event
the ultimate objective of an adversary in a sabotage or theft fault tree
112
Enhancement
change or modification to a system that improves the operation performance
113
Entry Control
physical equipment and procedures used to verify access authorization and to detect contraband. Part of the physcial protection function or detection
114
Entry Control Point
entrance to a site or secured area at that access is controlled and egress is allowed
115
Equalization
the process of correcting for transmission line losses of frequency characteristics of an electronic signal
116
Equalizer
an electronic device used to compensate for low and high frequency losses through a transmission system
117
Equalizing Pulses
pulses used to maintain horizontal sync in interlaced scanning that occur at twice the horizontal scan rate
118
Event
an act against a PPS that an adversary must perform to achieve their objective
119
Explosive Detector
Detects 1-ion mobility spectrometer, detecting all types of nitrated explosives 2-gas chromatograph-electron capture detector, detects nitrated commercial explosives including TNT
120
Faciltiy
a plant built or establised to serve a particular purpose
121
Faciltiy Characterization
describing, listing or drawing the major parts of a faciltiy
122
Fail-safe
systems that fail to lose power in such a way to protect an asset
123
Fail soft
the capabiltiy of a PPS to operate in a reduced capacity during a failure of some element in the system
124
False Alarm
alarm caused by internal equipment malfunction. Nuisance alarm. FAR= False alarm rate
125
Far Field
the far edge of an assessment or detection zone. Alarm assessment- resolution limited field of view
126
Feature Criteria Approach
defintion of a PPS in terms of the features or elements it must contain
127
Field
the video prodduced in one vertical scan of the camera imager or monitor that consists of 262.5 horizontal scan lines. 2 fields needed to form a single video frame
128
Field Frequency
rat which video fileds are create. 60Xs each second
129
Field of view
area visible through the lens of an optical instrument
130
FL FOcal Length
distance from the optical centre of a simple lens to the plane of focus and is indicative of the image size produced
131
Flare
light reflections from polished or shiny sufaces. Appear as bright areas on the video image
132
Float-charging (trickle-charging)
continuous slow charging of a storage battery in that the charging rate is just sufficient to compensate for internal losses or nomal discharge
133
F Number
the ratio of focal length to the clear aperture in a lens, expressed in the form f/1.8
134
Foot Candle
unit of illuminesance when the foot is taken as a unit of length. The illuminesance on a surface one square foot in area on which there is a uniformly distributed flux of on lumen. Amount of light a candle gives off in a square foot area
135
Force continum
description of the range of actions responders must use to counter an adversary. Begins with verbal commands and escalates to deadly force if necessary
136
Format
the size of a useable image in a TV camera or lens
137
Frame
a single tv picture, made up of 2 interlaced fields
138
Frame Frequency
the rate at which a complete frame is scanned - 30 frames per seconde
139
Freeze Frame
to display a single frame of video continuously
140
F Stop
the lens designaation indicating relative diaphragm opening or aperture diameter
141
Full band jamming
a jamming signal with a bandwith greater that or equal to the bandwidth of the signal being jammed
142
Full Duplex mode
refers to a transceiver function that allows receiving and transmitting simultaneously on 2 discreet frequencies
143
Ghost
a false image displace from the primary image caused by different arrival times of signals
144
Guards
the on-site faciltiy sercurity personnel. Response function of PPS
145
Hardening
enhancing a wall or door to make it more difficult to penetrate
146
Hoax
a false chain
147
Identification
the positive assessment of a recognized object, person, animal or thing
148
Illuminance
the density of the luminous flux incident on a surface
149
IMS Ion Mobility Spectrometer
a time of flight mass spectrometer that measures the mobility of ions at atmospheric pressure, a passive explosives vapor detector
150
Infrared (IR)
light or energy in that portions othe electromagnetic spectrum having a longer wavelength that visible light
151
Insider
a person who has knowledge of operations and security system characteristics and position that would endhance the likelihood of successful bypass or defeat of positive measures should that person attempt such a measure
152
Interlaced scanning
a process of interweaving two separate fields of video infromation to form a single video frame
153
Isolation zone
restricted access area surrounding a facility that has been cleared of any objects that could conceal vehicles or individuals. Affords unobstructed observation.
154
Jamming
an adversary's attempts to prevent comms through physical destruction of comms equip or through transmission of a disruptive radio signal
155
Jamming Geometry
the geometrical relationship tween the jammer and the radio untis in the system being jammed
156
Lag
image smearing and resolution loss when motion exists tween camera and scene
157
Light Level
intensity of incident light measured in foot-candles or lux
158
Linear Field of View
the measure of the field of view of a lens or camers expressing the width or height of the scene at a specified distance
159
Line of sight sensor
an IDS that requires a clear LOS in the detection space
160
Line lock
a condition when the vertical drive - vertical sync in video signal- is the same frequency as the power line
161
Line Sensor ( Volumetric sensor)
an IDS sensor that exhibits detection along a line
162
Line supervision
to monitor the integrity of communication lines
163
Local Comms
comms tween security personnel and law enforcement once at the location of the emergency
164
Local Threat Assessment
TA of a specific facilty, operation or geographical area
165
Logic Tree
a graphical representation of how a combination of events can end in a specific result. Describes how an adversary can reach their goal by defeating the PPS
166
LOS
Line of sight. THe distance a radio signal may be directly transmitted along the surface of the earth
167
Lossy
a cable that has high attenuation per unit lenght.
168
Lumen (lm)
the photometric unit of radiant power.
169
Luminaire
complete lighting unit consisting of a lamp or lamps together with the parts designed to distribute the light
170
Lux (lx)
the metric unit of luminance equal to 1 lumen indident upon 1m squared. 1 Lux = 0.0929 fc
171
Magnetic Buried-Line sensor
generates an electric signal when ferromagnetic material passes near the transducer
172
Magnetometer
a passive device that monitors the earth's magnetic field and detects changes to that field caused by the presence of ferromagnetic materials
173
Malevolent Act
an illegal action.
174
Malevolent action
a deliberate action with intent to harm or destroy installations or people
175
matching transformer
a passive device used to convert the impedence of a circuit to the impedance of a transmission line
176
metal Detector
detects the presence of metals
177
microwave reflector
a planar metallic surface or grid designed for passive reflection of a microwave beam and used for the purpose of directing the beam
178
microwave sensor
an active intrusion detection sensor that transmits microwave signals and detects changes in the signal caused by a moving object
179
monochrome signal
a tv signal without color information
180
monostatic
an active IDS where the transmitter and the receiver are located together, either the same or nearly coincident (bistatic)
181
nuisance alarm
not caused by an adversary intrusion. Electromagnetic, thermal, acoustic, seismic or wild life reasons.
182
Offset
the distance on the ground surface, measured from either the transmitter or receiver in the direction of the line of sight, in which an intruder can crawl under the beam of a microwave sensor undetected
183
Off site
area outside the facilities land boundaries
184
on site
area with the facilities land boundaries
185
Outriggers
the angled metal extensions at the top of the fence
186
outsider
a person who does not have official business with the facility or has not been granted routine access to a area.
187
overburden
a cover of dirt or rocks above a sensitive area to protect it from attack. access delay
188
overt
an action that is open and not concealed
189
P As (Probability of Assignment)
a measure of the speed and accuracy of determining the caouse of an alarm
190
P AD ( Probability of Assessed Detection)
the product of the probabilty of detection and the probability of assessment
191
P D (Probabilty of Detection)
the likelihood of detecting an adversary within the zone covered by an IDS
192
P E (Probability of system Effectiveness)
the product of the probability of interruption and the probability of neutralization
193
P I (Probability of Interruption)
the cumulative probabiltiy of detection from the start of an adversary path to the point determined by the time available for response (Tg)
194
P N (Probabiltiy of Neutralization)
the measure of response force effectiveness, given interruption. Neutralization uses the force continuum from verbal commands through deadly force to prevent adversary success.
195
P s
Probability that an IDS will sense an unathorized action, sometimes also called probabilty of detection
196
Passive
refers to a comms link that carries a signal only when an alarm occurs
197
passive Infrared Sensor
a passive IDS that detects different infrared energy over background levels
198
Passive Sensor
an IDS that produces no signal from a transmitter but simlply detects energy emitted in the proximity of the sensor
199
Performance Criteria Approach ( Feature Criteria Approach)
specification of a PPS in terms of the performance expected from it
200
Performance Test
process to be used to determine that the security features of a system are implemented as designed and that they are adequate for the proposed environment.
201
Perimeter
an isolation zone around a protected area or the boundary between off site and on site
202
Physical Protection
measures implemented for the protection of assets or facilities against theft, sabotage or malevolent attacks
203
Physical Security
the use of peope, procedures and equipment to control access to assets or facilities. The measures required for the protection of assets or facilities from espionage, theft, fraud, sabotage by malevolent human adversary
204
Physical Security Plan
a facility specific document that gives comprehensive description of the measures emplyed for th physcial protection of property, info, equipment, materials or other assets of interests
205
Point Detector
an intrusion sensor that has a small detection region ususally located close to the sensor
206
Portal monitor
any electric instrument designed to perform scans of items, people or vehicles at an ingress/egress for detecting weapons, explosives, nuclear material
207
Ported
cable having closely spaced, small holes or gaps in the shield that allows RF energy to radiate
208
Protocol
International standard
209
Quiescent
the state of an active intrusion sensor when there is no movement in the detection zone.
210
Qualitative
descriptions having to do with quality or worth.
211
Quantitative
descriptions having to do with numbers and statistics,
212
Risk
measure of the potential damage to or loss of an asset based on the probability or an undesireable occurrence
213
Risk Assessment
process of analyzing threats to and vulnerability of a facility, determining the potential for losses and identifying cost-effective corrective measures and residual risk
214
Roll Test
rolling through an instrusion sensor's expected detection zone to determine whether or not its functioning
215
Run test
running through an intrusion sensor's expected detection zone to determine if it is functioning
216
SAVI System Analysis of Vulnerabiltiy Intrusion
a dynamic analytical computer model using mutliple adversary paths
217
Sector
a defined portion of the PDS that may have mutiple sensors and CCTB coverage
218
Security Communications Network
the procedures and hardware used to carry comms among members of the security force during both normal and emergency operations
219
Seismic Buried-Line Sensor
a buried line sensor that detects mechanical pressure deformation and vibration transmitted through the ground burial medium to the sensor transducer
220
Seismic disturbances
mechanical pressure, deformation or vibration transmitted through the ground
221
Seismic-magnetic Buried-line Sensor
a buried-line sensor that is sensitive to both seismic and magnetic disturbances
222
Sensitivity Analysis
an examination of how a system responds when one or more of its elements are changed
223
Sensor
a device that responds to stumulus associated with an unauthorized action
224
Spoof
to defeat a sensor by allowing target to pass through detection volume without generating an alarm
225
Spread -spectrum System
a jam-resistant comms system in which the transmitted signal is much wider than the minimum
226
Stand off attack
an attack on a facility without entering it, missile from off site
227
Subsystem
a component or group comprising one unit or fulfilling one function of the PPS
228
Surreptitious
secret or stealthy, especially leavng behind no evidence of penetration or compromise
229
Synchronization
In a video monitor or image tube, the process of maintaining two or more scanning processes in phase
230
Sync pulse
a pulse transmitted as part of the composite video signal to control scanning
231
Tg
guard response time
232
Tr
Time available for response. The minimum delay along the portion of the adversary path remaing after the point at which the adversary must be detected to allow guard response. R just exceeds Tg
233
Tamper Alarm
an alarm that is generated when access doors to sensor electronics or site connections are opened or when the sensor detecst a spoofing attempt
234
Tamper-indicating Circuitry
line supervisory circuitry on data transmission lines and switches used to sense the loss of alarm capability
235
Tamper-indicating Device
a device that may be used on items such as containers and doors that will indicate containment integrity
236
Tampering
interference in an unauthorized manner to defeat a security device
237
Tamper-safing
the act of applying a temper indicating device
238
Target
the object of an attack. Asset. Can be tangible or intangible
239
Target Identification
the process of evaluating a faciltiy to determine locations wher an adversary might accomplish objectives
240
TDM Time Division Multiplexing
an alarm comms system, signals from more that one sensor are transmitted over a common wire at different predetermined times in a time interval scanning cycle
241
Terrain following sensor
an IDS that detects equally well on flat and irregular terrain. Line of sight
242
Test pattern
a chart used to evaluate many opertating parameters of a video camera or system.
243
Threat
an individual/group with the motivation and capability for theft or sabotage of assets or malevolent acts that would result in loss of assets
244
Threat Analysis
a process in which info about a threat or potential threat is subjected to systematic and thorough exam in order to id significant facts and derive conclusions from
245
Threat Assessment
a judgement based on available intelligence, law enforcement, open source info of the actual or potential threat to one or more facilities
246
Throughput
the rate which people pass through an entry control portal, contraband detector
247
Time Division multiplexing ( time scrambling)
a common analog voice scrambling technique
248
Timely Detection
the cumulative probability of detecting an adversary while there is still time for the response force to interrupt the adversary
249
Transducer
a device that receives waves from one medium/transmission system and supplies waves to another
250
Transient
a sudden high voltage spike in an electrical system caused by arcing or lightning
251
Triaxal Cable
a double shielded coaxial cable. A center conductor is surrounded by two concentric, independently shielded conductors. the conductors share the same axis
252
Twinaxial Cable
a coaxial cable having two center twisted conductors
253
Twisted Pair
a two conductor transmission line seldom used in video systems due to limited distance and bandwidth
254
Type I Error
in positive personnel identity verification system, rejection of a claimed identity when the id claimed is true. False reject
255
Type II Error
in a positive personnel identity verification system, acceptance of a claimed identity when the id claimed is false. False accept
256
UPS (Uninterruptible Power Source)
a battery powered, alternating current source that will maintain power to vital equipment even is site power is lost
257
Vault
a structure or room whose doors, walls and roof are designed to make penetration difficult
258
Vault type room
a facility approved room having a combination locked door and protection provided by a facility approved intrusion alarm system activated by any penetration of walls, floor, ceilings or openings within the room
259
Video Distribution amplifier
a wideband vieo amplifier used for the transmission of a single video signal to multiple video components from individual impedance matched outputs
260
Visible Sensor
an IDS that is in plain view of an intruder, attached to a fence or mounted on its own support. Covert sensor
261
Voice Privacy
the encoding of transmissions for the penetration of eavesdropping on radio traffic or receiving deceptive messages. Clear voice
262
Volume protection
monitoring an entire area to detect entry from any entrance portal, walls, floor or ceiling
263
Volumetric Sensor
IDS that exhibits detection in a volume of space
264
Vulnerability
an exploitable capability or an exploitable security weakness or deficiencey at a facility.
265
Vulnerability Analysis
a method of identifying the weak points of a facility
266
Vulnerability Assessment
a systematic evaluation process in which qualitative or quantitative techniques are applied to detect vulnerabilities and to arrive at an effectiveness level for a security system to protect specific targets from specific adversaries and their acts
267
Walk Test
walking through an IDS sensor's expected detection zone to determine it working properly
268
Waveform Monitor
an oscilliscope used specifically for measurement and analysis of video signals
269
X Band
Frequency 5200 - 11,000 MHz
270
Zone
a specific volume of space.
271
Zoom Lens
lens with a variable focal length
271
False Alarm
In intrusion detection. Those alarms caused by the equipment itself. Poor design, component failure
272
Capacitor
An electronic component consists of 2 conductor plates separated by a dielectric medium
273
Wiegand.
Coded credential - card with embedded wires with magnetic properties
274
PPS- Physical Protection System
Complex configuration of detection, delay and response elements that can be analyzed to determine system effectiveness Integrates people, procedures and equipment for the protection of assets or facilities against theft, sabotage or other malevolent human attacks.
275
CDP- Critical Detection Point
Point where there is still enough time remaining for the response force to interrupt the adversary
276
Standard Deviation
Measure of dispersion of a set of related data
277
Cyber security- availability
Assurance that computer or network is ready for use. Email servers transporting messages
278
Cyber security- confidentiality
Assurance that data is only accessed by those with proper authorization. Personal credit data, medical records, proprietary info
279
Cyber security- integrity
assurance that data is as it was conceived or received as it was transmitted
280
Cyber Protection System
CPS
281
Authentication
Assuring that a user is whom they claim to be. Proving so by logging on with something only user knows, has, unique to user
282
Authorization
Determination of the users rights. Ability to read, write or execute files
283
Nonrepudation
Following authentication the condition that user actions can absolutely be attributed to that user
284
Light trespass
Light pollution in I intended areas