Design and Evaluation of PPS - Mary Lynn Garcia Flashcards Preview

PSP > Design and Evaluation of PPS - Mary Lynn Garcia > Flashcards

Flashcards in Design and Evaluation of PPS - Mary Lynn Garcia Deck (285)
Loading flashcards...
1
Q

Acceptance Testing

A

performance of all necessary testing to demonstrate that installed equipment will operate in accordance with design plans and specifications

2
Q

Access Control

A

process of managing databases or other records and determining the parameters of authorized entry such as who or what will be granted access, when they may enter and where access will occur

3
Q

Access Control Measures

A

hardware and software features, physical controls, operating procedures, administrative, procedures and various combinations of these designed to detect or prevent unauthorized access to classified information, facilities or materials and to enforce utilization of these measures to protect security and property interests

4
Q

A C & D

A

Alarm Communication and Display - Refers to an integrated system of people, procedures and equipment that collects alarm data and presents the information in a manner that promotes rapid assessment.

5
Q

Acknowledge

A

to indicate the reception of an alarm signal

6
Q

Activated Delay

A

any technique that delays and adversary and depends on a sensor to initiate the delay mechanism

7
Q

Activated Denial

A

any technique that denies access to a target and depends on a sensor to initiate the denial mechanism

8
Q

Active

A

refers to a communication link that carries a continuous signal allowing immediate detection of a break in the link

9
Q

Active Infrared Sensor

A

an active intrusion detection sensor that emits infrared light and detects blockage of light

10
Q

Active Lines

A

scanning lines in the raster that contain video information

11
Q

Active Sensor

A

an intrusion detection sensor that emits a signal from a transmitter and detects changes in or reflections of that signal by means of a receiver- passive sensor

12
Q

Actual Force

A

force consisting of a physical act, especially a violent act directed against a robbery victim

13
Q

Actual Threat

A

a credible situation or validated information indicating that facility interest are currently or will be at risk

14
Q

Adversary

A

a person performing malevolent acts in pursuit of interests harmful to the facility - may be an insider or outsider

15
Q

Adversary Action

A

a specific act performed by an adversary

16
Q

Adversary Action Sequence

A

a required/ordered series of acts performed by an adversary to achieve their objectives

17
Q

Adversary Capabilities

A

attributes of the adversary, such a knowledge, motivation, and access to equipment that compromise a measure of his/her ability

18
Q

Adversary Class

A

adversaries are generally classed as insiders or outsiders, depending on whether they are working inside a facility or must start an action sequence from the outside

19
Q

Adversary Neutralization

A

the termination but the facility guard force of an attack such that the adversary is captured, killed or forced to flee

20
Q

Adversary Path

A

an ordered collection of actions against a target that if completed results in successful theft or sabotage

21
Q

Adversary Sequence Modeling

A

using an analytical model to estimate the probability of success of an adversary along a specific path or sets of paths

22
Q

Adversary Task

A

a specific act the adversary must perform in order to advance along a path - penetrate a barrier, travel a certain distance etc

23
Q

AFC

A

Automatic Frequency Control - (video /CCTV) An AFC circuit is used to maintain an oscillator at a specified frequency

24
Q

AGC

A

Automatic Gain Control - (video/CCTV) used to maintain an output signal at a constant level over a limited range of input signal levels

25
Q

Alarm

A

a warning from a sensor or sensor system that a sensor has been triggered or activated, usually signalled by light or sound, may indicate a valid, false or nuisance alarm

26
Q

Alarm Assessment

A

process of determining an alarm condition status, appraisal of the credibility, reliability, pertinence, accuracy or usefulness of an indicated alarm.

27
Q

Alarm Priority Scheme

A

a technique or presentation for dealing with alarms from a combination of sensors in a local order. Alarm presentation sequence based on importance or seriousness of alarm.

28
Q

Alert

A

communication that informs all personnel of a facility emergency and of the location of the emergency

29
Q

Analog signal

A

a signal that attains an infinite number of different amplitude levels as opposed to one that can attain only a finite number of levels as a function of time.

30
Q

Angular Field of View

A

the measure of the the field of view of a lens or surveillance camera lens combination expressed in degrees

31
Q

Annunciator

A

an electrically controlled signal board or indicator primarily used for alarm presentation to guard forces

32
Q

Aperture

A

The lens opening that determines the amount of light that will pass through the lens and onto the image plane

33
Q

ASD

A

Adversary Sequence Diagrams - a graphical display path that an adversary might take to accomplish his/her objective

34
Q

Assess

A

to determine the validity and response to an alarm signal

35
Q

Assessment

A

the determination of the cause of an alarm and information regarding the threat

36
Q

Assessment Zone

A

the volume of space in which assessments are possible

37
Q

Attack

A

an attempt by an adversary to defeat the physical protection system and achieve his or her objectives. Tactics include: force, deceit, stealth, used alone or in combination

38
Q

Authentication Code

A

a code known only to members of the response force.

39
Q

Auto-iris Lens

A

a lens whose aperture is controlled by monitoring the video signal amplitude and automatically adjusting the iris to maintain a constant video amplitude output

40
Q

Automated Access Control

A

electronic or electromechanical system used to authorize movement of personnel, vehicles or materials through entrances and exits of secured areas. Auth obtained by personal id info, computer comparison with data against authorized user list, computer activation of unlock mechanism is user has auth access

41
Q

Background Noise

A

the total system noise, independent from the presence or absence of a signal. Signal not included as part of the noise

42
Q

Balanced Line

A

a video transmission line whose impedance to ground from either side is equal (124ohms)

43
Q

Bandsplitting (Frequency scrambling)

A

common analog voice-scrambling technique that involves partitioning of an audio channel into several separate frequency bands that are transposed and interchanged before transmission

44
Q

Biometric Device

A

automatic device that can verify an individual’s identity from a biological measurement or feature

45
Q

Bistatic

A

an active intrusion detection sensor where transmitter and receiver are not side by side (collocated) in the same unit. They are separated.

46
Q

Blackmail

A

extortion by threat

47
Q

Blinding

A

reduction of scene information from high light levels entering the lens

48
Q

Blooming

A

loss of detail in a video picture due to excessive bright spot displayed on flourescent screen

49
Q

BMS Balanced Magnetic Switch

A

an intrusion sensor usually used to indicate a door opening. Switch is activated but the movement of a magnet mounted on the door

50
Q

Bridging (looping) lnput

A

a high impedance intermediate termination of a signal line at the input of an amplifier, monitor or video switcher where the signal line must continue on to other equipment. Allows several pieces of equipment to use a common video signal without loss of signal amp

51
Q

Brightness (luminance)

A

the attribute of visual perception in which an area appears to reflect or emit light, measured in foot-lamberts

52
Q

Broadband

A

wide bandwidth transmission system with a single carrier and multiple information channels. Fiber-optic or RF

53
Q

Broadband Jamming

A

simultaneous jamming of many adjacent frequencies by on high power jamming signal

54
Q

Buffer

A

a data area shared by hardware devices or program process that operate at different speeds or with different sets of priorities. Buffer is a midpoint holding place. Exists to support the coordination of separate activities as opposed to accelerating the speed of the activity

55
Q

Buried Line Sensor

A

a passive intrusion detection sensor that employs a buried transducer to detect seismic or magnetic disturbances

56
Q

Burned-In Image

A

an image that persists in a fixed position in the output signal of a camera tube after it has been turned to a diff scene

57
Q

Bypass

A

a sensor defeat mode in which an intruder defeats a sensor by avoiding detection

58
Q

CCD Charge Coupled Device

A

a semiconductor device that is used as an optical sensor and stores charge and transfers it sequentially to an amplifier and detector

59
Q

CCTV Closed Circuit Television

A

a tv system in which the signal distribution is limited or restricted, usually by cable

60
Q

Classification

A

the positive assessment that a detected object is human, animal or some other object

61
Q

Clear-voice

A

normal radio transmissions that have not been scrambled or encoded

62
Q

Clear zone

A

an area within the storage site perimeter and around the boundary of the storage site free of obstacles. Area is designed to facilitate detection and obs of an intruder

63
Q

Coaxial Cable

A

a cable consisting of a single conductor surrounded by and insulated from a metallic shield. Used for transmission of video based band

64
Q

Coercivity

A

measure of resistance of a magnetic material to changes int he stored info when exposed to a magnetic field.

65
Q

Collusion

A

secret agreement between two or more persons for a fraudulent, secret, illegal or malevolent purpose.

66
Q

Common mode

A

signals or signal components that are identical in amplitude, duration and time

67
Q

Communication

A

the transmitting or interchanging of information including alarm signals to central processing station and transmission of response info to security personnel

68
Q

Communication System

A

the equipment and procedures used but he security force for sending and receiving messages

69
Q

Complementary Sensors

A

sensors selected for combination because of their capabilities of mutually providing what the other lacks in terms of probability of detection, nuisance alarm rate and vulnerability to defeat

70
Q

Containment

A

physical barriers that restrict or control the movement of or access to nuclear material

71
Q

Continuous Detection

A

on a protected perimeter, no detection gaps occur in the detection zones of any of the sensor lines included in the perimeter subsystem

72
Q

Contraband

A

material such as firearms, explosives, of material not permitted to leave a particular area.

73
Q

Contrast

A

the ration of light and dark portions of a video picture

74
Q

Control track

A

the area on the tape containing a recording used by servomechanism to control the longitudinal motion of the tape during playback

75
Q

Covert Sensor

A

an intrusion detection sensor that is hidden from view, such as buried underground and does not radiate any signal detectable from outside the perimeter

76
Q

CPU Central Processing Unit

A

the microprocessor in computers that provides the computing power

77
Q

Crawl Test

A

crawling through an intrusion sensor’s expected detection zone to determine if it is working properly

78
Q

Crossover

A

the point at which the centre lines of 2 overlapping microwave sensor beams intersect

79
Q

Cross-talk

A

undesired transfer of signals between systems

80
Q

CRT Cathode Ray Tube

A

a display tube used in tv sets and CCTV monitors

81
Q

Deadly Force

A

force that a reasonable person would consider likely to cause death or serious physical injury that could lead to death

82
Q

Dead spot

A

gap in communication system coverage, radio coverage

83
Q

Dead Time

A

the length of time between 2 successive uses of the line by a particular sensor in a dime-division, multiplexed sensor system

84
Q

Deceit

A

attempt to defeat a security system using false id.

85
Q

Defeat

A

prevent someone from accomplishing their goal. Bypassing a sensor or system of access

86
Q

Delay

A

element of PPS to impede penetration into or exit of protected area

87
Q

Denial

A

the effect achieved by safeguards and security systems that impedes or hinders intruder from gaining access to a protected space

88
Q

Deployment

A

actions of the protective force from the time communication is received until the force is in position to neutralize the enemy.

89
Q

Depth of Field

A

the maximum distance from a CCTV camera lens that 2 objects may be separated in a given lens field of view and still maintain image focus of both objects

90
Q

Detection

A

determing that an unauthorized action has ocurred/ocurring. Sensing the action and assessing the alarm. Not complete without assessment

91
Q

Detection and Assessment

A

the element of a PSS to discover and verify an unauthorized intrusion attempt

92
Q

Detection Zone

A

an area under surveillance by one or more intrusion detection devices from which an alarm is produced when subject to a condition for an alarm

93
Q

Deterrence

A

discouraging an adversary from attempting an assault by making assault appear very difficult to accomplish

94
Q

Digital Encryption

A

the conversion of the analog voice signal to a digital signal in the system transmitter and the encoding of each bit of the digital data stream

95
Q

Digital Signal

A

a radio signal made up of a series of digital pulses produced by one current or voltage value

96
Q

Distribution Amplifier

A

a wideband amplifier having a single imput and several outputs for driving multiple signal lines

97
Q

Diversion

A

an attack that draws the atention of an enemy from the point of principal operation

98
Q

Doppler Effect

A

the change in frequency of sound/electromagnetic energy due to the motion of the object emitting/reflecting sound/electromagnetic

99
Q

Due Diligence

A

diligence reasonably from and excercised by a person who seeks to satisfy a legal requirement or obligation. Exercised to escape liability

100
Q

Duress code

A

a prearranged word or phrase that covertly indicates they are acting unwillingly

101
Q

Duress System

A

a system that can covertly communicate response to a security control center

102
Q

Dynamic

A

active comms link that generates a continually changing signal to rpresent the secure condition

103
Q

EASI - Estimate of Advisory Sequence Interruption

A

A dynamic analytical computer model

104
Q

ECD - Electron Capture Detector

A

A passive explosive vapor detector

105
Q

Effectiveness Evaluation

A

an analysis of the capabilty of a physical protection system to defeat an attack

106
Q

Electric-field Sensor

A

an active intrusion detection sensor that generates an electric field and senses changes in capacitance caused by an intruder

107
Q

Element

A

distinct part of physical protection system

108
Q

Embezzlement

A

stealing of $ or property bh employee to whom it has been entrusted

109
Q

EMI - Electromagnetic Interference

A

Disturbances of equipment operation caused by electromagnetic fields from outside sources

110
Q

Encryption

A

Digital comms - encoding an intelligible binary data stream to prevent unauthorized eavesdropping of radio transmission

111
Q

End Event

A

the ultimate objective of an adversary in a sabotage or theft fault tree

112
Q

Enhancement

A

change or modification to a system that improves the operation performance

113
Q

Entry Control

A

physical equipment and procedures used to verify access authorization and to detect contraband. Part of the physcial protection function or detection

114
Q

Entry Control Point

A

entrance to a site or secured area at that access is controlled and egress is allowed

115
Q

Equalization

A

the process of correcting for transmission line losses of frequency characteristics of an electronic signal

116
Q

Equalizer

A

an electronic device used to compensate for low and high frequency losses through a transmission system

117
Q

Equalizing Pulses

A

pulses used to maintain horizontal sync in interlaced scanning that occur at twice the horizontal scan rate

118
Q

Event

A

an act against a PPS that an adversary must perform to achieve their objective

119
Q

Explosive Detector

A

Detects 1-ion mobility spectrometer, detecting all types of nitrated explosives 2-gas chromatograph-electron capture detector, detects nitrated commercial explosives including TNT

120
Q

Faciltiy

A

a plant built or establised to serve a particular purpose

121
Q

Faciltiy Characterization

A

describing, listing or drawing the major parts of a faciltiy

122
Q

Fail-safe

A

systems that fail to lose power in such a way to protect an asset

123
Q

Fail soft

A

the capabiltiy of a PPS to operate in a reduced capacity during a failure of some element in the system

124
Q

False Alarm

A

alarm caused by internal equipment malfunction. Nuisance alarm. FAR= False alarm rate

125
Q

Far Field

A

the far edge of an assessment or detection zone. Alarm assessment- resolution limited field of view

126
Q

Feature Criteria Approach

A

defintion of a PPS in terms of the features or elements it must contain

127
Q

Field

A

the video prodduced in one vertical scan of the camera imager or monitor that consists of 262.5 horizontal scan lines. 2 fields needed to form a single video frame

128
Q

Field Frequency

A

rat which video fileds are create. 60Xs each second

129
Q

Field of view

A

area visible through the lens of an optical instrument

130
Q

FL FOcal Length

A

distance from the optical centre of a simple lens to the plane of focus and is indicative of the image size produced

131
Q

Flare

A

light reflections from polished or shiny sufaces. Appear as bright areas on the video image

132
Q

Float-charging (trickle-charging)

A

continuous slow charging of a storage battery in that the charging rate is just sufficient to compensate for internal losses or nomal discharge

133
Q

F Number

A

the ratio of focal length to the clear aperture in a lens, expressed in the form f/1.8

134
Q

Foot Candle

A

unit of illuminesance when the foot is taken as a unit of length. The illuminesance on a surface one square foot in area on which there is a uniformly distributed flux of on lumen. Amount of light a candle gives off in a square foot area

135
Q

Force continum

A

description of the range of actions responders must use to counter an adversary. Begins with verbal commands and escalates to deadly force if necessary

136
Q

Format

A

the size of a useable image in a TV camera or lens

137
Q

Frame

A

a single tv picture, made up of 2 interlaced fields

138
Q

Frame Frequency

A

the rate at which a complete frame is scanned - 30 frames per seconde

139
Q

Freeze Frame

A

to display a single frame of video continuously

140
Q

F Stop

A

the lens designaation indicating relative diaphragm opening or aperture diameter

141
Q

Full band jamming

A

a jamming signal with a bandwith greater that or equal to the bandwidth of the signal being jammed

142
Q

Full Duplex mode

A

refers to a transceiver function that allows receiving and transmitting simultaneously on 2 discreet frequencies

143
Q

Ghost

A

a false image displace from the primary image caused by different arrival times of signals

144
Q

Guards

A

the on-site faciltiy sercurity personnel. Response function of PPS

145
Q

Hardening

A

enhancing a wall or door to make it more difficult to penetrate

146
Q

Hoax

A

a false chain

147
Q

Identification

A

the positive assessment of a recognized object, person, animal or thing

148
Q

Illuminance

A

the density of the luminous flux incident on a surface

149
Q

IMS Ion Mobility Spectrometer

A

a time of flight mass spectrometer that measures the mobility of ions at atmospheric pressure, a passive explosives vapor detector

150
Q

Infrared (IR)

A

light or energy in that portions othe electromagnetic spectrum having a longer wavelength that visible light

151
Q

Insider

A

a person who has knowledge of operations and security system characteristics and position that would endhance the likelihood of successful bypass or defeat of positive measures should that person attempt such a measure

152
Q

Interlaced scanning

A

a process of interweaving two separate fields of video infromation to form a single video frame

153
Q

Isolation zone

A

restricted access area surrounding a facility that has been cleared of any objects that could conceal vehicles or individuals. Affords unobstructed observation.

154
Q

Jamming

A

an adversary’s attempts to prevent comms through physical destruction of comms equip or through transmission of a disruptive radio signal

155
Q

Jamming Geometry

A

the geometrical relationship tween the jammer and the radio untis in the system being jammed

156
Q

Lag

A

image smearing and resolution loss when motion exists tween camera and scene

157
Q

Light Level

A

intensity of incident light measured in foot-candles or lux

158
Q

Linear Field of View

A

the measure of the field of view of a lens or camers expressing the width or height of the scene at a specified distance

159
Q

Line of sight sensor

A

an IDS that requires a clear LOS in the detection space

160
Q

Line lock

A

a condition when the vertical drive - vertical sync in video signal- is the same frequency as the power line

161
Q

Line Sensor ( Volumetric sensor)

A

an IDS sensor that exhibits detection along a line

162
Q

Line supervision

A

to monitor the integrity of communication lines

163
Q

Local Comms

A

comms tween security personnel and law enforcement once at the location of the emergency

164
Q

Local Threat Assessment

A

TA of a specific facilty, operation or geographical area

165
Q

Logic Tree

A

a graphical representation of how a combination of events can end in a specific result. Describes how an adversary can reach their goal by defeating the PPS

166
Q

LOS

A

Line of sight. THe distance a radio signal may be directly transmitted along the surface of the earth

167
Q

Lossy

A

a cable that has high attenuation per unit lenght.

168
Q

Lumen (lm)

A

the photometric unit of radiant power.

169
Q

Luminaire

A

complete lighting unit consisting of a lamp or lamps together with the parts designed to distribute the light

170
Q

Lux (lx)

A

the metric unit of luminance equal to 1 lumen indident upon 1m squared. 1 Lux = 0.0929 fc

171
Q

Magnetic Buried-Line sensor

A

generates an electric signal when ferromagnetic material passes near the transducer

172
Q

Magnetometer

A

a passive device that monitors the earth’s magnetic field and detects changes to that field caused by the presence of ferromagnetic materials

173
Q

Malevolent Act

A

an illegal action.

174
Q

Malevolent action

A

a deliberate action with intent to harm or destroy installations or people

175
Q

matching transformer

A

a passive device used to convert the impedence of a circuit to the impedance of a transmission line

176
Q

metal Detector

A

detects the presence of metals

177
Q

microwave reflector

A

a planar metallic surface or grid designed for passive reflection of a microwave beam and used for the purpose of directing the beam

178
Q

microwave sensor

A

an active intrusion detection sensor that transmits microwave signals and detects changes in the signal caused by a moving object

179
Q

monochrome signal

A

a tv signal without color information

180
Q

monostatic

A

an active IDS where the transmitter and the receiver are located together, either the same or nearly coincident (bistatic)

181
Q

nuisance alarm

A

not caused by an adversary intrusion. Electromagnetic, thermal, acoustic, seismic or wild life reasons.

182
Q

Offset

A

the distance on the ground surface, measured from either the transmitter or receiver in the direction of the line of sight, in which an intruder can crawl under the beam of a microwave sensor undetected

183
Q

Off site

A

area outside the facilities land boundaries

184
Q

on site

A

area with the facilities land boundaries

185
Q

Outriggers

A

the angled metal extensions at the top of the fence

186
Q

outsider

A

a person who does not have official business with the facility or has not been granted routine access to a area.

187
Q

overburden

A

a cover of dirt or rocks above a sensitive area to protect it from attack. access delay

188
Q

overt

A

an action that is open and not concealed

189
Q

P As (Probability of Assignment)

A

a measure of the speed and accuracy of determining the caouse of an alarm

190
Q

P AD ( Probability of Assessed Detection)

A

the product of the probabilty of detection and the probability of assessment

191
Q

P D (Probabilty of Detection)

A

the likelihood of detecting an adversary within the zone covered by an IDS

192
Q

P E (Probability of system Effectiveness)

A

the product of the probability of interruption and the probability of neutralization

193
Q

P I (Probability of Interruption)

A

the cumulative probabiltiy of detection from the start of an adversary path to the point determined by the time available for response (Tg)

194
Q

P N (Probabiltiy of Neutralization)

A

the measure of response force effectiveness, given interruption. Neutralization uses the force continuum from verbal commands through deadly force to prevent adversary success.

195
Q

P s

A

Probability that an IDS will sense an unathorized action, sometimes also called probabilty of detection

196
Q

Passive

A

refers to a comms link that carries a signal only when an alarm occurs

197
Q

passive Infrared Sensor

A

a passive IDS that detects different infrared energy over background levels

198
Q

Passive Sensor

A

an IDS that produces no signal from a transmitter but simlply detects energy emitted in the proximity of the sensor

199
Q

Performance Criteria Approach ( Feature Criteria Approach)

A

specification of a PPS in terms of the performance expected from it

200
Q

Performance Test

A

process to be used to determine that the security features of a system are implemented as designed and that they are adequate for the proposed environment.

201
Q

Perimeter

A

an isolation zone around a protected area or the boundary between off site and on site

202
Q

Physical Protection

A

measures implemented for the protection of assets or facilities against theft, sabotage or malevolent attacks

203
Q

Physical Security

A

the use of peope, procedures and equipment to control access to assets or facilities. The measures required for the protection of assets or facilities from espionage, theft, fraud, sabotage by malevolent human adversary

204
Q

Physical Security Plan

A

a facility specific document that gives comprehensive description of the measures emplyed for th physcial protection of property, info, equipment, materials or other assets of interests

205
Q

Point Detector

A

an intrusion sensor that has a small detection region ususally located close to the sensor

206
Q

Portal monitor

A

any electric instrument designed to perform scans of items, people or vehicles at an ingress/egress for detecting weapons, explosives, nuclear material

207
Q

Ported

A

cable having closely spaced, small holes or gaps in the shield that allows RF energy to radiate

208
Q

Protocol

A

International standard

209
Q

Quiescent

A

the state of an active intrusion sensor when there is no movement in the detection zone.

210
Q

Qualitative

A

descriptions having to do with quality or worth.

211
Q

Quantitative

A

descriptions having to do with numbers and statistics,

212
Q

Risk

A

measure of the potential damage to or loss of an asset based on the probability or an undesireable occurrence

213
Q

Risk Assessment

A

process of analyzing threats to and vulnerability of a facility, determining the potential for losses and identifying cost-effective corrective measures and residual risk

214
Q

Roll Test

A

rolling through an instrusion sensor’s expected detection zone to determine whether or not its functioning

215
Q

Run test

A

running through an intrusion sensor’s expected detection zone to determine if it is functioning

216
Q

SAVI System Analysis of Vulnerabiltiy Intrusion

A

a dynamic analytical computer model using mutliple adversary paths

217
Q

Sector

A

a defined portion of the PDS that may have mutiple sensors and CCTB coverage

218
Q

Security Communications Network

A

the procedures and hardware used to carry comms among members of the security force during both normal and emergency operations

219
Q

Seismic Buried-Line Sensor

A

a buried line sensor that detects mechanical pressure deformation and vibration transmitted through the ground burial medium to the sensor transducer

220
Q

Seismic disturbances

A

mechanical pressure, deformation or vibration transmitted through the ground

221
Q

Seismic-magnetic Buried-line Sensor

A

a buried-line sensor that is sensitive to both seismic and magnetic disturbances

222
Q

Sensitivity Analysis

A

an examination of how a system responds when one or more of its elements are changed

223
Q

Sensor

A

a device that responds to stumulus associated with an unauthorized action

224
Q

Spoof

A

to defeat a sensor by allowing target to pass through detection volume without generating an alarm

225
Q

Spread -spectrum System

A

a jam-resistant comms system in which the transmitted signal is much wider than the minimum

226
Q

Stand off attack

A

an attack on a facility without entering it, missile from off site

227
Q

Subsystem

A

a component or group comprising one unit or fulfilling one function of the PPS

228
Q

Surreptitious

A

secret or stealthy, especially leavng behind no evidence of penetration or compromise

229
Q

Synchronization

A

In a video monitor or image tube, the process of maintaining two or more scanning processes in phase

230
Q

Sync pulse

A

a pulse transmitted as part of the composite video signal to control scanning

231
Q

Tg

A

guard response time

232
Q

Tr

A

Time available for response. The minimum delay along the portion of the adversary path remaing after the point at which the adversary must be detected to allow guard response. R just exceeds Tg

233
Q

Tamper Alarm

A

an alarm that is generated when access doors to sensor electronics or site connections are opened or when the sensor detecst a spoofing attempt

234
Q

Tamper-indicating Circuitry

A

line supervisory circuitry on data transmission lines and switches used to sense the loss of alarm capability

235
Q

Tamper-indicating Device

A

a device that may be used on items such as containers and doors that will indicate containment integrity

236
Q

Tampering

A

interference in an unauthorized manner to defeat a security device

237
Q

Tamper-safing

A

the act of applying a temper indicating device

238
Q

Target

A

the object of an attack. Asset. Can be tangible or intangible

239
Q

Target Identification

A

the process of evaluating a faciltiy to determine locations wher an adversary might accomplish objectives

240
Q

TDM Time Division Multiplexing

A

an alarm comms system, signals from more that one sensor are transmitted over a common wire at different predetermined times in a time interval scanning cycle

241
Q

Terrain following sensor

A

an IDS that detects equally well on flat and irregular terrain. Line of sight

242
Q

Test pattern

A

a chart used to evaluate many opertating parameters of a video camera or system.

243
Q

Threat

A

an individual/group with the motivation and capability for theft or sabotage of assets or malevolent acts that would result in loss of assets

244
Q

Threat Analysis

A

a process in which info about a threat or potential threat is subjected to systematic and thorough exam in order to id significant facts and derive conclusions from

245
Q

Threat Assessment

A

a judgement based on available intelligence, law enforcement, open source info of the actual or potential threat to one or more facilities

246
Q

Throughput

A

the rate which people pass through an entry control portal, contraband detector

247
Q

Time Division multiplexing ( time scrambling)

A

a common analog voice scrambling technique

248
Q

Timely Detection

A

the cumulative probability of detecting an adversary while there is still time for the response force to interrupt the adversary

249
Q

Transducer

A

a device that receives waves from one medium/transmission system and supplies waves to another

250
Q

Transient

A

a sudden high voltage spike in an electrical system caused by arcing or lightning

251
Q

Triaxal Cable

A

a double shielded coaxial cable. A center conductor is surrounded by two concentric, independently shielded conductors. the conductors share the same axis

252
Q

Twinaxial Cable

A

a coaxial cable having two center twisted conductors

253
Q

Twisted Pair

A

a two conductor transmission line seldom used in video systems due to limited distance and bandwidth

254
Q

Type I Error

A

in positive personnel identity verification system, rejection of a claimed identity when the id claimed is true. False reject

255
Q

Type II Error

A

in a positive personnel identity verification system, acceptance of a claimed identity when the id claimed is false. False accept

256
Q

UPS (Uninterruptible Power Source)

A

a battery powered, alternating current source that will maintain power to vital equipment even is site power is lost

257
Q

Vault

A

a structure or room whose doors, walls and roof are designed to make penetration difficult

258
Q

Vault type room

A

a facility approved room having a combination locked door and protection provided by a facility approved intrusion alarm system activated by any penetration of walls, floor, ceilings or openings within the room

259
Q

Video Distribution amplifier

A

a wideband vieo amplifier used for the transmission of a single video signal to multiple video components from individual impedance matched outputs

260
Q

Visible Sensor

A

an IDS that is in plain view of an intruder, attached to a fence or mounted on its own support. Covert sensor

261
Q

Voice Privacy

A

the encoding of transmissions for the penetration of eavesdropping on radio traffic or receiving deceptive messages. Clear voice

262
Q

Volume protection

A

monitoring an entire area to detect entry from any entrance portal, walls, floor or ceiling

263
Q

Volumetric Sensor

A

IDS that exhibits detection in a volume of space

264
Q

Vulnerability

A

an exploitable capability or an exploitable security weakness or deficiencey at a facility.

265
Q

Vulnerability Analysis

A

a method of identifying the weak points of a facility

266
Q

Vulnerability Assessment

A

a systematic evaluation process in which qualitative or quantitative techniques are applied to detect vulnerabilities and to arrive at an effectiveness level for a security system to protect specific targets from specific adversaries and their acts

267
Q

Walk Test

A

walking through an IDS sensor’s expected detection zone to determine it working properly

268
Q

Waveform Monitor

A

an oscilliscope used specifically for measurement and analysis of video signals

269
Q

X Band

A

Frequency 5200 - 11,000 MHz

270
Q

Zone

A

a specific volume of space.

271
Q

Zoom Lens

A

lens with a variable focal length

271
Q

False Alarm

A

In intrusion detection. Those alarms caused by the equipment itself. Poor design, component failure

272
Q

Capacitor

A

An electronic component consists of 2 conductor plates separated by a dielectric medium

273
Q

Wiegand.

A

Coded credential - card with embedded wires with magnetic properties

274
Q

PPS- Physical Protection System

A

Complex configuration of detection, delay and response elements that can be analyzed to determine system effectiveness

Integrates people, procedures and equipment for the protection of assets or facilities against theft, sabotage or other malevolent human attacks.

275
Q

CDP- Critical Detection Point

A

Point where there is still enough time remaining for the response force to interrupt the adversary

276
Q

Standard Deviation

A

Measure of dispersion of a set of related data

277
Q

Cyber security- availability

A

Assurance that computer or network is ready for use. Email servers transporting messages

278
Q

Cyber security- confidentiality

A

Assurance that data is only accessed by those with proper authorization. Personal credit data, medical records, proprietary info

279
Q

Cyber security- integrity

A

assurance that data is as it was conceived or received as it was transmitted

280
Q

Cyber Protection System

A

CPS

281
Q

Authentication

A

Assuring that a user is whom they claim to be. Proving so by logging on with something only user knows, has, unique to user

282
Q

Authorization

A

Determination of the users rights. Ability to read, write or execute files

283
Q

Nonrepudation

A

Following authentication the condition that user actions can absolutely be attributed to that user

284
Q

Light trespass

A

Light pollution in I intended areas