PSP Study Guide Words Flashcards

1
Q

Adhering to duty guidelines

A

Officers must conform to set standard of conduct that do not go beyond their established duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Breach of Duty

A

officers that engage in unreasonable illegal conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Foreseeability

A

events which cause loss, harm or damage that should have been known prior to the event happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

intentionally tort

A

a wrong committed with intent to cause harm to property or people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tort

A

certain wrongful conduct that causes physical injury, interferes with one’s physical security, freedom of movement, property damage, or property loss. Tort actions are civil causes where one person brings a personal suit against another, seeking monetary compensation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Imputed negligence

A

negligence of one party can be charged to another based upon an existing relationship between parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intentional Tort

A

a wrong committed with the intent to cause harm to property or people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Liability

A

something for which one is legally obliged, an obligation, responsibility or debt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Negligence

A

failure to exercise the degree of care considered reasonable under the circumstances, resulting in an unintendted injury to another party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-delegable duty

A

some obligations of the organization cannot be entirely transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Negligent Tort

A

a wrong committed through failure to excercise sufficient care in doing what is otherwise permissible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Teft Triangle

A

3 factors present for theft to occurr: Motive, Desire, Opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Three principles of CPTED

A

Territoriality, Natural Surveillance, Defensible Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Territoriality

A

property design that creates a psychological barrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Natural Surveillance

A

to be able to witness criminal acts or detect unusual acitvity through clear sight lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compensatory damages

A

Actual damages related to the amount of the loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Defensible Space

A

security measures and property designs that allow for the control of the environment. natural access control, video surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Punitive damages

A

Designed to punish the defendant and to deter him from repetition of the wrongful act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risk Analysis

A

An assessment done that looks at problem identification and probability determination. Methods for estimating the expected loss from an occurrence of some adverse event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cost benefit analysis

A

A comparison of the security unit operation costs and all security measures compared to the amount of corporate property saved or recovered including any reduction of losses caused by injuries and lost productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cost benefit ratio

A

Helps determine efficiency or effectiveness versus cost. Three concepts: cost, reliability, delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Information Security

A

Protection of info and it’s critical elements, including the systems and hardware that use, store and transmit the info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Information Systems

A

Computer based info processing systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Internal Controls ( computers)

A

Procedures designed to control the operation of computer systems, controls over the configuration, changes to programs without approval and controlling administrative privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Defensible space
Includes territoriality and natural surveillance. Living environment must be opened up and used by residents. Stimulates self policing
25
Site design
Clustering of small numbers of residential units around private hallways, courtyards
26
Predictability
Percentage of chance that one can predict that upcoming events are likely to cause great security risks. Indicator of behaviour
27
Probability
Reflects what is historically known. Likelihood of incident taking place based on past incidents
28
Convenience
The more hard lined security is the less convenient it is for perp to take chance on committing crime
29
Building inspection
Used to advise a tenant of their vulnerabilities as they pertain to physical characteristics of dwelling
30
Security survey
Encompasses the entire complex in contrast to only a portion of the site Documents used to id risk. Comprised do data collected by security personnel ID facts, gaps or inefficiencies and overall security needs and provide recommendations to mitigate risk
31
Security analysis
More in depth study, includes risk management , analysis of risk factors, environmental measures, analysis of crime patterns, fraud and internal theft
32
Minimum security
Designed to impede some unauthorized external activity
33
Low level security
Designed to impede and detect some unauthorized external activity
34
Medium security
Designed to impede, detect and access most unauthorized external and some unauthorized internal activity
35
High level security
Designed to impede, detect and assess most unauthorized external and internal activity
36
Maximum security
Design to impede, detect, assess and neutralize all unauthorized external and internal activity
37
Chain-linked fencing
Constructed of 7ft material excluding top guard Must be of 9 gauge or heavier 4 sq. in. Or smaller openings Twisted and barbed salvage at top and bottom Secured to rigid metal or reinforced concrete posts set in concrete Posts 10' or less apart Must reach within 2" of hard ground. Soft ground - reach deep enough to compensate for shifting soil or sand All bolts and nuts holding hardware should be welded
38
Ward lock
Longest in use and first developed
39
Lever lock
Came after warded in 18th century. Offered more security than warded
40
Pin Tumbler lock
Consists of : the pin, a driver or separate metal cylinder, and a spring
41
Attack methods- drilling or punching
Breaking off combination dial and drilling a hole to the exposed locking device
42
Attack methods- burning
Use of high temp torches to cut opening in wall or door
43
Attack methods- pealing
Attack the seams of the vault, using tools to expose locking mechanism or interior
44
Incandescent
``` Produces light by using electric current to heat a filament. Instant on Low initial cost Compact Short life High heat outpu Inefficient ```
45
Quartz- Quartz halogen
Incandescent bulbs with halogen gas Good color rendition High heat output Inefficient
46
Fluorescent
Pass electricity through a gas enclosed tube to create light Create 2Xs the light and half the heat of incandescent Long life Efficient Temp sensitive
47
Mercury Vapor
``` High intensity discharge device which produces light by excitation of mercury vapours. Emits blueish white light. Long life Low initial cost Delayed hot restart Inefficient operation ```
48
Metal halide
``` High intensity discharge arc tube which light is produced by the radiation of excited metal halides. Excellent color rendition Imitates daylight Works well with CCTV Restart can take several minutes High initial cost High maintenance cost ```
49
High pressure sodium
``` High intensity discharge arc tube which light is produced by radiation from sodium Vapor operating under pressure Very efficient Good in fog Hot restart takes several minutes High initial cost ```
50
Low Pressure Sodium
High intensity discharge arc tube which light is produced from sodium Vapor operating under pressure Very efficient Poor color rendition Expensive to maintain
51
Barbed wire
``` 7' height Post not more than 6' apart 12 gauge twisted double strand 6" max between strands Vertical wire midway between posts ```
52
PPS consist of Three elements
Architectural, Operational, Security systems
53
Architectural
Barriers, locks, exterior, interior lighting, critical building services, space layout, parking, adjacent buildings
54
Operational
Organization and staffing, policies, procedures, training, visitot control, guard staffing, emergency response
55
Security Systems element
Automated access control, intrusion detection systems, alarm systems, CCTV, comms,
56
Three types of measure in PPS
Preventative, Corrective, Detective
57
Preventative
Reduce likelihood of a deliberate attack, deter an attack, introduce delays, reduce vulnerabilities, deny the attack to be successful
58
Corrective
Reduce the effects of an attack and restore the facility to normal ops
59
Detective
Distinguish between authorized and unauthorized personnel, help discover attacks, and trigger appropriate preventative or corrective measures
60
Probability
The study of possibility of occurrence
61
ALE annual Loss Expectancy
Calculation of impact and frequency ALE= 10(f+i-3)/ 3 I= cost valuation (impact) of the event= single loss expectancy (sle) f= estimated frequency of the event = annual rate of occurrence (ARO)
62
Criticality during a cost analysis
Prevention- I'd threat before it can get started Control- I'd how threat event might be kept from impacting specific assets Recovery- how the operation will be restored after the threat
63
Cost-Benefit ratio
``` Determines the efficiency or effectiveness versus cost 3 concepts that make up ratio: Cost Reliability Delay ```
64
VSAT- vulnerability Self Assessment Tool
Tool to help develop PPSs. Protects specific targets from specific threats ``` ID assets ID thReats Determine criticality ID existing countermeasures Determine risk level Determine probability of failure Assign vulnerability Determine if risk is acceptable Develop new countermeasures Perform risk-cost analysis Develop BCP ```
65
CARVER
Vulnerabilities from attacker POV Criticality - how important the target is Accessibility- ease do access to the target Recoverability-ability to recover from an attack Vulnerability-ease of attack on target successfully Effects-direct loss from attack Recognizability- ease of target recognition