Physical Security Assessment Flashcards
(118 cards)
How is risk measured?
The value of the asset in relation to the threats and vulnerabilities associated with it.
How is a security risk rating calculated?
Asset value rating
X
Threat likelihood rating
X
Severity of incident rating
X
Vulnerability rating
=
Security risk rating
Conditions that tend to increase assets’ exposure to the risk of loss can be divided into which categories?
Physical – Includes factors such as the organization’s types and location of facilities, the operational technology or industrial control systems, and the criticality of on-site processes and assets.
Nonphysical – Includes factors such as geo-political landscape, culture, speed of decision-making, and intensity of competition.
Logical – Includes information and digital assets and the network or digital space that connects them.
How often should the risk assessment process be revisited?
It should be a cyclical and continuous effort since the elements are constantly subject to change over time.
What is the purpose of a security survey?
Determine and document the current security posture,
Identify deficiencies and excesses in existing security measures,
Compare the current posture with a determination of the appropriate level of security of protection needed,
Recommend improvements in the overall situation.
What factors should be addressed with considering vulnerabilities?
Lack of redundancy or backups for critical functions,
Single points of failures,
Collocation of critical systems, organizations, or components,
Inadequate response capability to recover from an attack,
Ease of aggressor access to a facility,
Inadequate security measures in place,
Presence of hazardous materials,
Potential for collateral damage from other companies in the area.
What is the difference between a physical security assessment and a security survey?
A security survey focuses more on vulnerabilities.
Is a cost-benefit analysis used in a physical security assessment or in a risk assessment?
A cost-benefit analysis should be used in both.
What are the functions included in a functional approach to a physical security assessment?
Security architecture and engineering,
Structural security measures,
CPTED,
Electronic security systems,
Security officers and the human element.
What are typical areas to assess in a physical security assessment?
Barriers, doors, windows/other openings, locks, safes and other containers, signage, lighting, alarm systems, electronic systems, security services, vehicle/traffic/parking controls, utilities protection, visitor management, and package handling.
Why should automated assessment tools only be used to ASSIST in completing an assessment?
May give a false sense of knowledge in security assessment,
High cost,
Complexity of software
Computers cannot factor in unquantifiable characteristics.
What is asset prioritization based on?
Each asset’s criticality to the organization’s mission and overall strategy.
What is the defense-in-depth approach?
An adversary must avoid or defeat a number of protective devices or features in sequence.
Why does each layer of security require a separate act by the adversary?
This causes uncertainty in the perpetrator’s mind, increases attack preparation time, adds steps to the intrusion, and allows time for a security or police response.
What is an important thing to consider when addressing layered security?
Interdependencies at each layer.
What is the principle of balanced protection?
The protection system’s individual applications and components will be integrated and converged so that they provide an equal level of protection.
What is involved in the appraisal component of the security survey?
Developing and communicating recommendations for enhancements.
What is the focus of a physical security assessment?
The risks to the physical assets and property of an organization, and the protection measures (against any risk) that comprise the realm of physical security.
The physical security assessment could provide the basis for what?
A comprehensive and integrated security analysis and risk assessment across the organization,
Identifying security gaps,
Identifying the range of potential solutions and its advantages/disadvantages,
Assisting in the development of organization security risk management, continuity, response, and recovery programs.
What costs should be considered in a cost-benefit analysis?
Technology costs,
Opportunity costs,
Process impact costs,
Time costs
Personnel costs
Overall capability costs.
What are three common approaches to a physical security assessment?
Outside-Inward approach,
Inside-Outward approach,
Functional approach.
This physical security assessment approach occurs when an assessment team takes the role of perpetrator and begins outside the facility focusing on the successive layers of Security.
Outside-Inward approach.
This physical assessment approach occurs when an assessment team takes the role of defender and works their way from the asset out toward the outer perimeter.
Inside-Outward approach.
This physical security assessment approach occurs when an assessment team evaluates security functions/disciplines and correlates the findings from the assessment component.
Functional (security discipline) approach.