Flashcards 47 - 95
(49 cards)
- Budgetary estimates are?
A cost estimate of each security so_____ for budgeting and planning purposes.
Solution
- Three types of project estimates?
Budgetary estimates
Preliminary Design estimates
And Life cycle cost estimates
- The 7 procedures to be covered when creating a detailed estimate?
S, CL, EC, Subs,
OIA, IC, PR
S – Spreadsheet format (Use a spreadsheet format)
• C – Components list (Develop a list of components and their prices)
• E – Equipment costs (Identify special equipment and prices/rates)
• S – Subsystems (PPS) (Identify PPS subsystems)
• P – Preparation for install (Identify other installation activities)
• I – Installation crews (Form installation crews)
• P – Productivity rates (Establish productivity)
- The 7 procedures to be covered when creating a detailed estimate?
S, CL, EC,
IDSS, IDOIA, FIC, and EPR
S – Use a spreadsheet
CL - components list
EC - equipment costs
IDSS – Identify PPS subsystems
OIA – Identify other installation activities
IC – Form installation crews
PR – Establish productivity rates
- The four stages of a project?
Project F__ D___ E___& C____
Feasibility
Development
Execution and
Closeout
- In what stage of the project should any changes in scope, deliverables or activities be subject to a more systematic change process & submitted to the change review board (CRB)?
Stage 3…Project execution
- The seven deliverables of the planning stage?
PM, PT, RA, PM, BE, DC and C and LR
PM→ Selection of Project Manager
PT → Selection of Project Team
RA → Risk Assessment Report
PM → Procurement Method
BE → Budgetary Estimates
DC→ Design Criteria
C and LR → Contracting and Legal Requirements
- Two types of physical barriers?
Natural and Structural barriers
- This type of barrier includes fields, rivers, cliffs, marshes & deserts?
Natural barriers
- This type of barrier includes berms, ditches, trees and shrubs, fences doors and glazing materials?
Structural barriers
- Three common means of preventing trespassing?
Walls
Chain link fences
Moats and other barriers
- Six considerations when erecting a chain link fence?
People build fences for good territory
• People → Posts
• Build → Bracing
• Fences → Fabric
• For → Fence top treatment
• Good → Gates
• Territory → Turnstiles
- When should barbed wire be installed atop a fence?
If the fence is intended to deter human trespassing.
- A cement apron under a fence is installed to….
Prevent individuals or objects from going under the fence.
- The 8 considerations when placing physical barriers and site hardening?
Target attractiveness and overall risks to the site
Nearby perimeter and adjacencies
Perimeter options & outer and inner security systems
Cost effectiveness
Response directives & operational procedures
- When are planters an effective vehicle barrier?
When properly anchored to the ground.
- Sturdy and short cylindrical posts meant to divert traffic or absorb vehicular impact?
Bo______
Bollards
- The purpose of a turnstile?
Control pedestrian traffic and
Minimizing tailgating or (piggybacking)
- Five measures to strengthen doors are?
SP, KP, AF, SS & SW
• Strength → Steel plates
• Keeps → Kick plates
• All → Anchoring frames
• Structures → Set screws (in hinges)
• Secure → Spot welding (hinges)
- 5 types of window glass?
A or P
T
W
L
B/B-r
• A or P→ Annealed or plate
• T→ Tempered glass
• W→ Wired glass
• L→ Laminated glass
• B/B-r→ Bullet/Burglar resistant glass
- Four window-related security materials?
WB
BC
WF
SS
WB→ Window Bars
BC → Blast Curtains
WF → Window Film
SS → Security Shutters
- At what dimension should opening be fortified?
96 square inches
619 square centimeters
- Four key factors in hardening a facility?
SOD,
SI
P PC
R of OS
• Some → Stand-off distance
• Strong → Structural integrity of the premises
• Protections → Prevention of progressive collapse
• Required → Redundancy of operating systems
- Four typical objectives of an access control system?
P AAA to
D, M & P
PRO
PRO
-Permit authorized assets access to controlled areas;
-Detect, minimize & prevent access or exit of unauthorized assets from controlled areas.
-Provide information to security personnel for the assessment and response to unauthorized entry
-provide a record of who, what, when, where and how accesss to controlled areas was granted.