Physical Security Flashcards Preview

SPeD SFPC Certification > Physical Security > Flashcards

Flashcards in Physical Security Deck (49)
Loading flashcards...

What is the purpose of Physical Security?

Prevention and Protection


What is Security-in-Depth?

- Integration of physical security measures to protect national security and DoD assets

- Accomplished through active and passive complementary security controls


What are the steps in the Risk Management Process?

Identify assets
Identify threats
Identify vulnerabilities
Risk analysis
Countermeasure options
Risk management decisions


How does one Identify Assets in the Risk Management Process?

- Determine the nature and value of an asset
- Determine the degree of impact if the asset is damaged or lost


How does one Identify Threats in the Risk Management Process?

- A threat is the perceived imminence of intended aggression by a capable entity to harm

- Identify and assess the threats to assets identified in the Identify Assets step of the Risk Management Process


How does one Identify Vulnerabilities in the Risk Management Process?

- Vulnerabilities are weaknesses, characteristics or circumstances that can be exploited by an adversary to gain access to or information

- Identify the vulnerabilities and determine their extent

- If not addressed, vulnerabilities may result in the degradation, loss of life or damage to mission-essential resources


What is Risk Analysis?

The determination of an impact of an unwanted event and the likelihood that it could happen


What do Countermeasure Options do in regards to the Risk Management Process?

Protect DoD assets by reducing vulnerabilities and mitigating threats


What are Risk Management decisions based on?

The the cost versus the benefit of protecting a DoD asset


Physical Security Policies

DoD 5200.08-R
DoDI 5200.08
DoDD 3020.40
DoDI 2000.12
DoDI O-2000.16 v1-2
DoDM 5100.76


Name 3 Physical Security Roles

Installation Commander or Facility Director
Antiterrorism Officer (ATO)
Physical Security Officer
Operations Security (OPSEC)
Officer Counterintelligence (CI) support personnel
Local, state and federal law enforcement officials


What is the purpose of the Antiterrorism Executive Committee (ATEC)?

- Develop and refine antiterrorism program guidance, policy and standards
- Determine resource allocation priorities and mitigate or eliminate terrorism-related vulnerabilities
- Act upon recommendations of the Antiterrorism Working Group and Threat Working Group


What is the purpose of the Antiterrorism Working Group (ATWG)?

- Assess requirements for physical security
- Recommend and develop policy
- Prepare planning documents
- Conduct criticality, vulnerability and risk assessments


What is the purpose of the Threat Working Group (TWG)?

- Identify foreign, domestic and local threats
- Inform the installation commanding officer (CO) of current threat trends in the area of responsibility


What is the purpose of the Mission Assurance Senior Steering Group (MA SSG)?

Advocacy, coordination and oversight to assist in both vertical and horizontal mission assurance alignment efforts on issues that cut across all DoD protection programs, including antiterrorism


What is the purpose of the Physical Security Officer?

Charged with management, implementation and direction of all physical security programs


What is the purpose of CI Support?

Provides valuable information on the capabilities, intentions and threats of adversaries


What is the purpose of the OPSEC Officer?

Responsible for developing countermeasures against potential threats to national security and other DoD assets


What positions/roles should be included in a Threat Working Group?

- Antiterrorism Officer
- CI Representative
- Law Enforcement Representative
- OPSEC officer
- Information Operations Representative
- Chemical, Biological, Radiological, Nuclear and High Yield Explosives (CBRNE) Representative


Who designates Restricted Areas?

- Facility directors or installation commanders designate restricted areas

*Warning signs displaying “Restricted Area” must be posted at the boundary of each restricted area


Name 3 Possible Building Protective Measures

- Entrances and exits limited to the minimum number
- Doors can be made of solid steel
- Windows can be covered with shatter-proof protective film
- Vents can be secured with steel bars


Name 5 Physical Security Countermeasures

Protective barriers
Site lighting
Security forces
Security systems
Facility access control
Lock and key systems
Storage containers and facilities


Fencing, poured concrete, hardened steel or natural barriers are examples of what?

Protective Barriers


What is the purpose of Site Lighting?

- Allows observation of persons and activities
- Discourages unauthorized entry
- Supplement other protective measures


Types of Lighting

- Continuous lighting - Fixed lights arranged to flood an area continuously with overlapping cones of light (common)
- Standby lighting - Like continuous lighting, except lamps are not on continuously, used when additional lighting is necessary
- Emergency lighting - Depends on alternative power sources and is reserved for times when regular lighting is not available
- Movable lighting - For supplemental lighting as necessary


Security Forces consist of what type of personnel?

DoD civilian personnel
DoD military personnel
DoD contract personnel (private or commercial source)
Trained dogs


Name 3 Duties of Security Forces

Roving patrol
Response force
Security system monitoring


Name 3 types of Security Systems

Access control systems
Screening equipment
Two-way radios
Closed circuit television (CCTV)
Exterior Intrusion Detection Systems
Interior Intrusion Detection Systems


Name the 4 types of interior IDS

- Volumetric Detectors - Detect changes in the environment in a particular area
- Interior Barrier Protectors - Protect against amateur intruders (including infrared beams/trip wires)
- Proximity Detectors - Provide point security and protect items inside a building
- Operable Opening Switches - Used on doors, windows, and other similar openings


What are the 4 Exterior IDS Sensors?

- Fence Disturbance Sensors - Detect fence disturbances
- Invisible Barrier Protectors - Detect motion within a specific area using microwave or infrared technology
- Buried Line Sensor - Reacts to vibrations or pressure in a certain area (line buried)
- Electric Field Sensor - Multiple wires, one with a current and the other a sensing mechanism. When something enters the
electromagnetic field that is in the wire, the energy in the wire is disturbed and activates
an alarm