Flashcards 1-46

(46 cards)

1
Q

Two foundational design principles?

-the four D’s

-layered s___ (d___ in d____)

A

Deter, detect, delay, deny;

Security….defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The point where the delay time remaining exceeds the response force time is called?

A

The Critical detection point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Area security is….?

A

Significant perimeter protection and entry is controlled at a single portal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Point security is….?

A

When the outer perimeter is loosely controlled and the primary focus is on individual buildings or restricted areas within.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 3 conflicts that might arise in the design process for physical security measures:

TC - SS - CC

A
  1. Tech Conflicts – Access control measures (like surveillance, sensors, and doors) can interfere with each other.
    1. Safety vs. Security – Safety and security objectives don’t always align (e.g., a locked door enhances security but may hinder emergency exits).
    2. Culture Clash – Security goals might not fit an organization’s mission or culture (e.g., strict security may feel restrictive in an open, collaborative workplace).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Balanced protection is…?

-A concept in the se____de___ pr____ where all aspects - el___st____hu____and pr____of a security system complement and work with each other.

A

Security design process;

Electronic, structural, human and procedural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A key factor in the nature of the physical security design & strategy employed to meet protection objectives?

A

The type or use of the facility or asset being protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Two types of design criteria are:

Pe_________criteria

Fe_________criteria

A

Performance criteria - elements chosen for their contribution to performance;

Feature criteria - elements chosen because certain features are required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Performance criteria is…?

A

A design process that selects elements & Procedures according to the contribution they make to overall system performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Feature Criteria is….?

A

A design process that selects elements or procedures to satisfy requirements that certain items be present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Five aspects that must be considered when developing security system procedures?

Pe
Op
Ma
T and A
In - incident-b and Ex In

A

Proper → People
• Operations → Operations
• Maintain → Maintenance
• Training → Training & Awareness
• Investigations → Incident-based & Exploratory Investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The 9 basic factors to know from the onset in security design?

“GC&R, PR, CS&G,
T of C, SL, MS,
U, LS and I

A

• Great → Governing codes & regulations
• People → Protection requirements
• Create → Company Standards & guidelines
• The → Type of construction
• Smartest → Site layout
• Measures → Material selection
• Using → Utilities
• Logical → Life safety
• Insights → Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An equation used for calculating risk when developing a design?

A

Risk = vulnerability x threat x asset value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

According to FEMA, the two basic classifications of threats or hazards are….?

A

Natural and human caused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the design basis threat (DBT)?

A profile of the SE&O of a facility based on the TCCM-(T-T&P) as well as the GIM of an adversary

A

A profile of the security engineering and operations of a facility based on the type, composition, capabilities and methods (tactics, techniques & procedures) as well as the goals, intent & motivation of an adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a requirements document:

A

-ID’s the reasons for a new or an upgraded system;
-closely tied to a risk assessment by identifying specific security measures to mitigate threats and reduce vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The planning process is the c____, r______ and a______ of d______ relative to the facility where t_____ S___ w____ be i______.

A

-the collection, review and analysis of data relative to the facility where the system will be implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In developing the objectives for implementing or upgrading the PPS, they should be 1) _______ and 2) _____?

A

The objectives must be clearly stated and they must be SMART.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SMART stands for

A

Specific, measurable and then for

IPPS - aggressive but achievable, realistic and time bounded;

For POA - attainable, repeatable and time dependent

20
Q

Factors - 6 - that weigh in physical security design?

“As
B or FT
Su
Lo
MS
R

A

As→ Assets under protection
B or FT→ Building or facility type
Su → Surroundings
Lo → Location
MS → Management support
R - resources

21
Q

In CPTED security layering, where is the first layer of security?

A

At the Perimeter of the property.

22
Q

In CPTED layering, where is the 2nd layer of security?

A

At the building exterior

23
Q

In CPTED security layering, which layers are inside the building?

A

The 3rd, 4th and 5th layers:
-3 - segragates authorized from unauthorized visitors;
-4-segregates generally accessible client areas from staff only areas;
5-further restricts staff access to highly sensitive areas.

24
Q

What is CPTED?

A

An approach to reducing crime or security incidents through the strategic design of the built environment. It uses organizational, mechanical & natural methods, to control access, enhance natural surveillance and territoriality and support legitimate activity.

25
Three approaches (measures) to CPTED strategies?
Mechanical measures Organizational measures Natural or architectural measures
26
Natural surveillance is….?
A CPTED strategy to increase visibility from in to out and from out to in to increase witness potential -foster a sense of exposure to criminals; -give advance visibility to areas people are entering.
27
The broken windows theory?
-Leaving broken windows or other decay markers unaddressed leads to the impression of abandonment and increases crime opportunity b/c no capable guardian is observed.
28
Compartmentalization?
-A CPTED strategy to design multiple or concentric layers of security measures around highly protected assets; also known as protection in depth
29
The four levels of integration are? “Every Person Secures Everything”
“Every Person Secures Everything” • Every → Electronic Security System • Person → Physical Security System • Secures → Security Programs • Everything → Enterprise Risk Management
30
A successful security design integrates 3 primary elements?
Architectural aspects; Security systems; and Operational factors
31
PSIM is….?
Physical Security Information Management
32
In regards to resources, what 3 things does project management involve?
Planning, organizing and controlling resources on a project.
33
Four constraints on any project?
Scope; Schedule Budget and Quality
34
The 6 typical elements in the project management process for a PPS? PC, PD, MB, MI, A, MW
Project concept • Designing the project • Managing the bid process • Implementation process management • Acceptance of work • Warranty process initiation & management
35
What are the two first phases of system design principles?
Planning and assessment
36
The six typical tasks of a technical security project? RA C (Sch……) D De Dev Con Do Bi Con
Risk Analysis Conceptual (Schematic) Design Design Development Construction Documents Bidding Construction
37
What term describes the outcome of the overall planning phase through a set of security requirements or objectives that is used as the basis of the eventual design?
Design basis
38
The ground rules and guidelines for the design are:
The design criteria
39
The two phases in design and documentation? The DD P and the CD P
DD - The design development phase & CD - The construction documents phase
40
The three sections of the procurement documents - also known as contract (or bid) documents: CD - CS - CD
Contractual details; Construction specifications and Construction drawings
41
What 5 items are part of the construction document (CD) phase package? CD d S B of Q RSB CT and C
Can Smart Builders Really Construct?” • C – CD Drawings • S – Specifications • B – Bill of Quantities • R – Refined System Budgets • C – Contract Terms and Conditions
42
The results of detailed specifications are: 1) 2)
-1.) all bidders get the same complete understanding of requirements and 2.) final implementation reflects what was intended.
43
CADD stands for…..?
Computer-aided design drafting
44
The table of related security devices is called….?
The Hardware Schedule
45
Three types of cost estimates are:
Budgetary estimates Preliminary design estimates and Final design estimates
46
The two possible designers of the system are:
Customer or end user; Contractor or integrator