Physical Security Flashcards Preview

CPP > Physical Security > Flashcards

Flashcards in Physical Security Deck (124)
Loading flashcards...
1

What is the difference between a design process based on performance criteria and one based on feature criteria?

A design process based on performance criteria will select elements and procedures according to the contribution they make to overall system performance.

A feature criteria approach selects elements or procedures to satisfy the requirements that certain items are present.

2

What are the three types of attacks used to defeat an axis controlled entry point?

Deceit,
Physical attack,
Technical attack.

3

What is CPTED?

Crime prevention through environmental design, is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means.

4

What are the three types of CPTED solutions?

Mechanical measures,
Human and organizational measures,
Natural measures.

5

What is natural territorial reinforcement?

Natural territorial reinforcement is the process of establishing a sense of ownership, responsibility, and accountability and property owners, managers, or occupants to increase vigilance in identifying trespassers.

6

What is the “broken windows” theory?

The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian (i.e. security presence) is observed.

7

What is Jane Jacobs “eyes on the street” theory?

A precursor to defensible space theory, it suggested that residential crime could be reduced by orienting buildings toward the street, clearly distinguishing public and private domains, and placing outdoor spaces near intensively used areas.

8

What is defensible space?

The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment could elicit behavior from residents that would contribute significantly to their safety. It includes real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance.

9

How does situational crime prevention differ from CPTED and defensible space?

Situational crime prevention seeks to reduce crime opportunities in all behavioral contexts, not just in the built environment.

10

What is the best source of a protection dog?

A reputable professional breeder.

11

What theory underpins situational crime prevention?

Rational choice theory.

12

What are the four approaches to situational crime prevention?

Increase the effort required (e.g. target hardening, access control),
Increase the risk of being caught (e.g. entry screening, surveillance),
Reduce anticipated rewards (e.g. target removal, property labeling),
Remove excuses (e.g. deploy signage simulating the conscience, rule setting).

13

What is the preferred glass type for mitigating blast forces?

Laminated glass is preferred for mitigating blast forces.

14

What are the four main strategies of second generation CPTED (the four Cs)?

Cohesion,
Capacity threshold (tipping point),
Community culture,
Connectivity.

15

When should security risks be addressed in architectural planning?

During the programming phase of design, when the owner describes the purpose and occupants of the building to the architect.

16

What are the three challenges that Security design poses for architects?

Determining requirements,
Knowing the technology,
Understanding architectural limitations.

17

Who may edit officers’ incident entries in a database log?

Higher level supervisors.

18

How should changes or corrections be made in officers’ written log entries?

Under a new event number as a separate item.

19

At what size and how far above the ground should an opening in a building’s shell be protected?

Reinforce or secure any openings in the building shell that measure more than 96 in.² (619 cm²) and are lower than 18 feet (5.5 m) above the ground.

20

What are the two most popular breeds of protection dogs in the United States?

German Shepherd,
Doberman Pinscher.

21

Who should populate the command center at a special event?

Hosting organization,
Facility management,
Law enforcement,
Security,
Fire marshal,
Medical director,
Sponsors,
Promoters,
Transportation/parking,
Accommodations.

22

What shape columns should be used in new parking facilities?

Round columns, because they allow for a greater visibility then square or rectangular columns.

23

Where should stairwells and elevators be ideally located in parking facilities?

In the center, visible from wherever the attendant is posted.

24

What kind of gates can be used for driveways where an overhead track would be in the way?

Cantilever slide gates.

25

How many subjects should a single post order cover?

One.

26

When should a supervisor visit a security post?

Regularly, in an unscheduled manner.

27

What two values describe sensor effectiveness?

Probability of detection,
Confidence level.

28

When is containment a good strategy?

When theft is the adversary’s goal. Containment involves preventing the adversary from leaving the site with stolen items.

29

What is “minimum resolvable temperature”?

The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder and the background.

30

What are the five main ways of classifying exterior intrusion sensors?

Passive/active,
Covert/visible,
Line of sight/terrain following,
Volumetric/line detection,
Application.