Flashcards 1-46
(46 cards)
Two foundational design principles?
-the four D’s
-layered s___ (d___ in d____)
Deter, detect, delay, deny;
Security….defense in depth
The point where the delay time remaining exceeds the response force time is called?
The Critical detection point
Area security is….?
Significant perimeter protection and entry is controlled at a single portal.
Point security is….?
When the outer perimeter is loosely controlled and the primary focus is on individual buildings or restricted areas within.
What are 3 conflicts that might arise in the design process for physical security measures:
TC - SS - CC
- Tech Conflicts – Access control measures (like surveillance, sensors, and doors) can interfere with each other.
- Safety vs. Security – Safety and security objectives don’t always align (e.g., a locked door enhances security but may hinder emergency exits).
- Culture Clash – Security goals might not fit an organization’s mission or culture (e.g., strict security may feel restrictive in an open, collaborative workplace).
Balanced protection is…?
-A concept in the se____de___ pr____ where all aspects - el___st____hu____and pr____of a security system complement and work with each other.
Security design process;
Electronic, structural, human and procedural
A key factor in the nature of the physical security design & strategy employed to meet protection objectives?
The type or use of the facility or asset being protected.
Two types of design criteria are:
Pe_________criteria
Fe_________criteria
Performance criteria - elements chosen for their contribution to performance;
Feature criteria - elements chosen because certain features are required.
Performance criteria is…?
A design process that selects elements & Procedures according to the contribution they make to overall system performance.
Feature Criteria is….?
A design process that selects elements or procedures to satisfy requirements that certain items be present
Five aspects that must be considered when developing security system procedures?
Pe
Op
Ma
T and A
In - incident-b and Ex In
Proper → People
• Operations → Operations
• Maintain → Maintenance
• Training → Training & Awareness
• Investigations → Incident-based & Exploratory Investigations
The 9 basic factors to know from the onset in security design?
“GC&R, PR, CS&G,
T of C, SL, MS,
U, LS and I
• Great → Governing codes & regulations
• People → Protection requirements
• Create → Company Standards & guidelines
• The → Type of construction
• Smartest → Site layout
• Measures → Material selection
• Using → Utilities
• Logical → Life safety
• Insights → Infrastructure
An equation used for calculating risk when developing a design?
Risk = vulnerability x threat x asset value
According to FEMA, the two basic classifications of threats or hazards are….?
Natural and human caused
What is the design basis threat (DBT)?
A profile of the SE&O of a facility based on the TCCM-(T-T&P) as well as the GIM of an adversary
A profile of the security engineering and operations of a facility based on the type, composition, capabilities and methods (tactics, techniques & procedures) as well as the goals, intent & motivation of an adversary.
What is a requirements document:
-ID’s the reasons for a new or an upgraded system;
-closely tied to a risk assessment by identifying specific security measures to mitigate threats and reduce vulnerabilities.
The planning process is the c____, r______ and a______ of d______ relative to the facility where t_____ S___ w____ be i______.
-the collection, review and analysis of data relative to the facility where the system will be implemented.
In developing the objectives for implementing or upgrading the PPS, they should be 1) _______ and 2) _____?
The objectives must be clearly stated and they must be SMART.
SMART stands for
Specific, measurable and then for
IPPS - aggressive but achievable, realistic and time bounded;
For POA - attainable, repeatable and time dependent
Factors - 6 - that weigh in physical security design?
“As
B or FT
Su
Lo
MS
R
As→ Assets under protection
B or FT→ Building or facility type
Su → Surroundings
Lo → Location
MS → Management support
R - resources
In CPTED security layering, where is the first layer of security?
At the Perimeter of the property.
In CPTED layering, where is the 2nd layer of security?
At the building exterior
In CPTED security layering, which layers are inside the building?
The 3rd, 4th and 5th layers:
-3 - segragates authorized from unauthorized visitors;
-4-segregates generally accessible client areas from staff only areas;
5-further restricts staff access to highly sensitive areas.
What is CPTED?
An approach to reducing crime or security incidents through the strategic design of the built environment. It uses organizational, mechanical & natural methods, to control access, enhance natural surveillance and territoriality and support legitimate activity.