Summary CPP cards Flashcards

1
Q

What are the main purposes of testing physical security systems and technologies?

A

To ensure continuous monitoring for performance, effectiveness, and suitability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the ASIS International Risk Assessment standard define security as?

A

The protection being provided against hazards, threats, risks, and menaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can managers benefit from a Security Metrics Program?

They can v, a, c and m PC and SP

A

They can view, analyze, compare, and measure program components and staff performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What 5 pieces of knowledge can security professionals gain from effectively applying security metrics?

UP
I R
D P
A C and
Lev Se Ca

A

Understanding performance
Identifying risks
Discovering problems
Assessing compliance
Leveraging security capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the key aspects included in designing a metrics program for security?

MF
T____, o____ and s_____ C E

A

Measurement framework,
technical, operational, and
strategic criteria evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three key approaches to evaluating security metrics?

A

Effectiveness, efficiency, and strategic improvement aligned with organizational objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What 6 questions should be considered when evaluating each element of the security program?

PF
SF
NP
P
T and
R

A

• PF → Primary functions
• SF → Secondary functions
• NP → Necessary procedures
• P → Processes
• T → Tools
• R → Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the basic tool for developing an understanding in physical security projects?

A

Security risk assessment or security survey.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the first step in a comprehensive risk assessment?

A

Identifying and valuing the organization’s assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 6 categories that can increase assets’ exposure to the risk of loss?

P,S,P environment
HE
P and P and
CC

A

Physical environment,
social environment,
political environment,
historical experience,
procedures and processes, and
criminal capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a gap analysis used for in the risk assessment process?

To determine steps to i_____
An org’s r______ a______ capacity.

A

To determine steps to improve an organization’s risk assessment capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the best method for monitoring and preparing to respond to security risks?

A

An ongoing risk assessment program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between qualitative and quantitative risk assessment?

A

Qualitative uses expert judgment, while quantitative uses probabilities and statistics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When might using a blended approach for risk assessment be appropriate?

A

When combining elements of qualitative and quantitative analysis is most suitable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the focus of a physical security assessment or security survey?

A

Risks to physical assets and property, along with protection measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What eight documents are typically included in a bid package?

C I
Dr
Sp
HS
BI
Li
T and C, and
S-s Info req

A

Contract information,
drawings,
specifications,
hardware schedules,
bidder instructions,
licenses,
terms and conditions, and
security-sensitive information requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When should a bidder’s conference or site visit be scheduled?

A

One week after the Request for Proposal (RFP) is issued.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the three steps taken after receiving bids for a project?

EB for C to R
P a FE and
S a B

A
  1. Evaluate bids for conformance to requirements
  2. Perform a financial evaluation, and
  3. then select a bidder.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are 3 pillars discussed during the initial kick-off meeting for a contract?

A

Setting the course for scope, schedule, and budget.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What activities are involved in managing the warranty period?

A

Initiating and evaluating warranty work conformance within the scope and schedule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the focus of the initial phase of a security design project?

P&A to develop the B of D and resultant D D

A

Planning and assessment to develop the basis of design and resultant design documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why is it important to establish a security ‘basis of design’?

PR
Th
As
Vu
RA and
CDS

A

• PR → Project Requirements
• Th → Threats
• As → Assets
• Vu → Vulnerabilities
• R A → Risk Assessment
• CDS → Conceptual Design Solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are 12 key elements considered in developing design criteria?

Co and St
Ca, Qu, and Pe,
Co, fe and op,
Cu, im, and mo, and
Re

A

Codes and standards,
Capacity, quality and performance,
Cost, features and operations,
culture, image, and monitoring, and
response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the six elements of the management process in security projects?

IM
QM
RM
CM
RM and
PM

A

• IM – Integration Management
• QM – Quality Management
• RM – Resource Management
• CM – Communications Management
• RM – Risk Management
• PM – Procurement Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the three constraints under which security projects work?
Project scope, project schedule, and project budget.
26
What are the 5 basic tasks of physical protection system (PPS) implementation? P&A DCS PDD SB and In
• P&A → Planning and assessment • DCS → Developing conceptual solutions • PDD → Preparing design documentation • SB → Soliciting bids • In → Installation
27
What are the 6 roles a security project manager may play in the security project process? DCC PDM BM PI S and C
Design concept creator, principal decision maker, budget manager, project influencer, stakeholder, and contractor.
28
What are the five phases through which security projects are typically administered? PC PP PDM PBPM and PC
Project conception, project planning, project design management, project bid process management, and project construction.
29
What should security projects do to integrate physical, electronic, and operational security elements? Use AR To Create a CS To d, d and R To S I
Use available resources to create a cohesive solution to deter, delay, and respond to security incidents.
30
What 6 things are included in the project management process for an integrated PPS project? U D M D P S, S and B D the P, and M the B P
Understanding decision makers, defining project scope, schedule and budget designing the project, and managing the bid process.
31
What are the two crime prevention operating assumptions related to CPTED? C P K is C D and In; and S must be F and C
1) Crime prevention knowledge is continually developing and interdisciplinary; and 2) strategies must be flexible and creative.
32
What are 5 ways CPTED measures can help prevent repeat victimization? By R S of V R A I P S P V T and B easy A to T
By quickly removing signs of victimization, By regulating access By improving physical security By protecting vulnerable targets, and By blocking easy access to targets
33
According to routine activity theory, how can the presence of capable guardians deter crime?
Capable guardians may deter crime by their presence.
34
What is the focus of situational crime prevention?
To manage, design, or manipulate the environment to increase effort and risk for potential offenders while reducing rewards.
35
What are the four main strategies of second-generation CPTED?
Cohesion, capacity threshold, community culture, and connectivity.
36
What does CPTED 3-D stand for?
Designation of space, Definition in terms of management and identity, and Design as it relates to desired function and behavior.
37
What 3 tools apply to the underlying elements of CPTED: territoriality, surveillance, and access control? E T S ( n______/e_____ ), and A C (n_____/m______)
Effective training, surveillance (natural/ electronic), and access control (natural/mechanical).
38
How can security practitioners reduce opportunities for crime through architectural design?
By integrating CPTED features during initial planning and working with appropriate community and professional groups.
39
What is the focus of access control strategies (3) in physical security?
1) deny access to a crime target, 2) create a perception of risk in potential offenders, 3) and include detection, delay, and response strategies.
40
Name some examples (3) of mechanical access control methods. L, C K S and S D and WH
Locks, card key systems, special door and window hardware.
41
Why should a metrics program only be established after introspection and planning?
To ensure measures are properly collected, analyzed, defined, scoped, and applied.
42
What does SMART stand for in the context of metrics?
Specific, Measurable, Attainable, Repeatable, Time-dependent.
43
Why should metrics be specific according to the course notes?
To provide actionable intelligence for a clear purpose.
44
What does it mean for a metric to be attainable?
A metric should not take excessive time to gather to remain effective.
45
Why is it important for a metric to be time-dependent?
Consistent collection ensures accuracy and meaningful comparison.
46
How does analyzing physical security systems from an operational perspective help?
It enhances efficiency by addressing system flaws like excessive alarms.
47
What insights (3) do metrics tracking the human element in security programs provide? In into RS C, and OE
Insights into required staffing, costs, and operational efficiency.
48
How does collecting and analyzing metrics help improve a security program?
It shows program effectiveness and areas for enhancement.
49
What should acceptance tests of physical security measures simulate?
Actual threat conditions up to site-specific threat limits.
50
What 3 factors should be considered in determining what tests to conduct on security systems? S-S T W-C S C S F
Site-specific threats, worst-case scenarios, critical system functions, etc.
51
What are the 6 categories of expenses in security system procurement?
Bonding, overhead, operating costs, maintenance costs, other costs, and adjustments.
52
What are the three major forms of security systems procurement?
Sole source, request for proposal (RFP), and invitation for bid (IFB).
53
When should the type of procurement be selected in the design phase?
Before or at the start of the design phase.
54
When is sole source procurement appropriate?
When an owner already has a vendor on board.
55
What is the purpose of a Request for Proposal (RFP) in security systems procurement?
To competitively choose vendors based on factors like cost, schedule, and technical ability.
56
What is the key feature of Invitation for Bid (IFB) in procurement?
Projects are competitively bid, and the award goes to the lowest responsive bidder.
57
What should be reviewed when comparing proposal costs? The L-C C, which includes c____ and m_____ costs Over the system’s u_____ life.
The life-cycle cost, which includes capital and maintenance costs over the system's useful life.
58
What factors should be checked if one proposal's costs are significantly lower than others? ME Q of E CE Understanding of the P and FS
Mathematical errors, quality of equipment, contractor experience, understanding of the project, and financial stability.
59
What should be done before making an award decision in procurement?
Check all contractors' references.
60
What should the designer attempt to determine during interviews with leading contenders?
Good relationship with contractor's reps, experience, problem-solving, and working well with other trades.
61
What should negotiating the final price with shortlisted contractors be based on?
Value.
62
What is essential for the successful implementation of any physical security construction project?
A well-defined and executed procurement contract.
63
What are the 6 components of a full-featured access control system? CR CC DP CD S and R to E devices
Credential reader, communication cabling, distributed processor, central database, software, and request-to-exit devices.
64
What is personnel access control used for?
To authorize entry and verify personnel authorization to a controlled area.
65
How can an access control point be defeated through deceit?
By employing false pretenses to convince security personnel for entry.
66
What are some common types of credentials used in personnel access control?
Photo identification badges, exchange badges, stored-image badges, coded credentials.
67
What is the purpose of metal detectors in contraband detection?
To sense contraband using a varying magnetic field over a short period.
68
What are the basic building blocks of an intrusion detection system?
Sensors that initiate the detection function and indicate intrusion attempts.
69
What 4 technologies can sensors in intrusion detection systems be based on? Op El ElMe Me
• Op → Optical • El → Electronic • ElMe → Electromechanical • Me → Mechanical
70
What 4 things must be included in a VA report to make it understandable to facility management? D of F DT IA and SEA
Description of facility, defined threats, identified assets, and system effectiveness analysis.
71
How should a VA report be protected and distributed?
Defined in master project agreement for protection and appropriate distribution.
72
What approach does the assessment team take in the Outside-Inward Approach?
Adversary role, penetration of physical perimeter, envision ways to get in.
73
In the Inside-Outward Approach, which role does the assessment team take?
Security professional (defender) role, working from asset/target outwards.
74
What are 5 examples of security layers considered in VA assessments? A/T C/V C A S D and B P
Asset/target, container/vault, controlled area, security desk, and building perimeter.
75
What does the Functional (Security Discipline) Approach address in VA assessments?
Addresses each security function or discipline individually.
76
What does the Security Architecture and Engineering component of VA assessments address?
Design of facilities with security features built in from the start.
77
What 4 things are included in Structural Security Measures in VA assessments? O B S P B L S and Li S
Overall building structure, physical barriers, and locking and lighting systems.
78
What does Crime Prevention Through Environmental Design (CPTED) focus on in VA assessments?
Engages planners, designers, architects, law enforcement, for crime prevention.
79
What 5 things does the Electronic Security Systems component of VA assessments encompass? AC ID S Co ES
• A C→ Access control • I D → Intrusion detection • S → Surveillance • C → Communications • ES → Electronic systems
80
Why is evaluation of security officers and the human element important in VA assessments?
Discuss importance of QA and QC programs in managing security officers.
81
What are the three primary functions of a Physical Protection System (PPS)? D D and R
Detection, delay, and response.
82
What does the detection function in a PPS involve? Discovery of C or O actions by an a______ and e______ C
Discovery of covert or overt actions by an adversary and entry control.
83
How is delay effectiveness in a PPS measured?
Time required by the adversary to bypass each delay element.
84
What is the purpose of the response function in a PPS?
Preventing adversary success through interruption and accurate communication.
85
Why is it important for a PPS to have functional integration of detection, delay, and response? To reduce v____; deviation from this integration implies h_____ v_______
To reduce vulnerability; deviation from this integration implies higher vulnerability.
86
What factors determine the amount of protection required for an asset? V of the A and the R T of the En
Value of the asset and the risk tolerance of the enterprise.
87
Why is a cost-benefit analysis important in the security assessment process?
To weigh actual costs of security measures against projected results.
88
In a Vulnerability Assessment (VA), why is it crucial to analyze the PPS as a system of features working together?
To determine the overall effectiveness and identify potential solutions.
89
What is the purpose of a VA report in relation to the PPS?
Inform facility management of PPS state and needed upgrades.
90
What are the three types of skills demanded in security roles?
Cognitive (knowledge), psychomotor (physical), and affective (attitudinal) skills.
91
What should be part of a risk analysis survey when determining the size of security force?
Determining the size of the force.
92
What are the three security force models discussed in the notes?
Proprietary or in-house staff, contract staff, and a hybrid approach.
93
What 8 factors should organizations consider when determining the appropriate security force structure? T of O and PG L and R R F and M C PE and CF
Type of organization and programmatic goals, location(s) and regulatory requirements, financial and management capabilities, performance expectations and cultural factors.
94
What are the 6 basic functions of a security officer force? Pa A C In Mo ER and Tr Co
Patrol, access control, inspection, monitoring, emergency response, traffic control, etc.
95
What 5 vital roles can security officers fill in organizations? PS and CP Co and Ma tasks and Re
Physical security and crime prevention Consulting and management tasks, and Representative.
96
What should organizations review before purchasing uniforms and equipment for security officers?
Relevant laws and guidelines to ensure compliance and differentiate from law enforcement officers.
97
Why is it important to establish minimum standards for hiring and training security officers?
Quality and competence of security force impact the success of security operations.
98
How can organizations leverage the human element in security?
By including nonsecurity personnel with specialized security knowledge.
99
What should organizations do to assess the effectiveness of physical security measures?
Test and monitor security measures.
100
What are the three main types of tests mentioned in the notes? C….. LS….. and Ev
Coordinated, limited scope, and evaluation tests.
101
How often should an evaluation test of the security system be performed?
At least once a year.
102
What should a formal report after an exercise document?
The review of PAPMS plans, processes, proposed actions, and nonconformities.
103
What is the purpose of conducting internal audits?
To evaluate the physical protection system and validate compliance.
104
What are the two main types of physical protection system maintenance?
Remedial maintenance and preventive maintenance.
105
What does preventive maintenance include?
Keeping hardware and software in good condition, updating, and testing.
106
What are the three major security purposes of lighting?
Creating a psychological deterrent, enabling detection, and enhancing video surveillance.
107
What are the characteristics that affect security effectiveness of lighting? Q of L L or I, L R, and C T
Quantity of light, level or intensity, light reflectance, and color temperature.
108
What are the four applications for security lighting?
Standby, continuous, movable, and emergency.
109
What are the types of lighting equipment used for security purposes? St, Se, Fl, Fr and H M lighting.
Streetlight, searchlight, floodlight, Fresnel, and high mast lighting.
110
What does Crime Prevention Through Environmental Design (CPTED) target?
Places, behavior, design and use of space.
111
What are the underlying elements of CPTED?
Territoriality, surveillance, and access control.
112
What are the categories of CPTED measures?
Mechanical, organizational, and natural.
113
What is natural territorial reinforcement in CPTED?
Establishing ownership and accountability to increase vigilance.
114
How can natural surveillance help in CPTED? Increasing v______ to detect T or M
Increasing visibility to detect trespassers or misconduct.
115
What is natural access control in CPTED? Using _____ to d____ and l______ access to a space.
Using barriers to define and limit access to a space.
116
What are the three main characteristics of intrusion sensor performance?
Probability of detection (PD), nuisance alarm rate, vulnerability to defeat.
117
Name some authoritative bodies providing guidance on sensor standards. U L ASTM GSA NFPA and EAS
Underwriters Laboratories (UL), American Society for Testing and Materials (ASTM), General Services Administration (GSA), National Fire Protection Association (NFPA), European Alarm Standard.
118
What are the classifications of exterior intrusion sensors based on detection methods? P or A C or V L of S or T F V or line detection App
Passive or active, covert or visible, line-of-sight (LOS) or terrain-following, volumetric or line detection, application.
119
Which are 7 common exterior sensor technologies mentioned in the notes? PCC FDS SF EF or CS FIS Bi M S VMD
• PCC → Ported coaxial cables • FDS → Fence disturbance sensors • SF → Sensor fences • EF or CS → Electric field or capacitance sensors • FIS → Freestanding infrared sensors • Bi M S → Bistatic microwave sensors • VMD → Video motion detectors (VMDs)
120
What is emphasized as important despite technological advancements in security solutions?
The need for well-trained security officers.
121
Why is there a growing trend towards more highly trained security officers?
To offer a greater return on investment.
122
What are the challenges presented by the rapid change of technologies in security?
Increased need for security officers with learning and adapting capabilities.
123
How should businesses approach the training of security personnel?
By committing resources to support the required training for better service quality.
124
According to the notes, how should security personnel be viewed in a security plan?
As part of a comprehensive plan, not a standalone resource.
125
What is the most critical yet most expensive component of a security program?
Security personnel.
126
What categories of services are typically included in a system maintenance agreement?
Both physical protection system (PPS) and remedial maintenance.
127
Why is it beneficial to select a single contractor for system maintenance?
To have a single point of contact for diagnosing and resolving problems.
128
What should a maintenance agreement be structured to resolve?
Both noncritical problems and major disruptions to the organization.
129
Why is it important to train staff in preventive maintenance?
To better understand and operate security systems.
130
What should the maintenance plan consider regarding security systems tuning?
Periodic tuning to eliminate nuisance and false alarms.
131
What is essential to develop in a maintenance plan? G to identify R and R
Guidelines to identify roles and responsibilities.
132
What aspects of service levels should be jointly developed by the customer and contractor? SP SL and RT for each component.
Support plan, service levels, and response times for each component.
133
How can costs escalate rapidly in a maintenance agreement?
Due to staff hours, travel, and equipment required for guaranteed response times.
134
Why should roles and responsibilities be clearly defined in system maintenance agreements?
To ensure minimum downtime and operational efficiency.
135
What factors may affect support fees in maintenance agreements?
Geographic location, online diagnosis, and support capabilities.
136
What pricing approach might consist of a fixed fee for an advance period?
Plus allowances or formulas for various costs.
137
What type of documentation should the manufacturer provide regarding the system configuration? Comprehensive documentation including SS, CD, SPL and IS
Comprehensive documentation including switch settings, cable diagrams, spare parts lists, and installation steps.
138
Why is it important for all subsystems to have advanced diagnostics?
To identify faulty components for easy replacement in the field.
139
How can remote diagnostics be helpful for a large, decentralized system?
It allows for troubleshooting and diagnostics without physical presence.
140
What does subscribing to an upgrade service after installation guarantee?
Incorporation of latest engineering change orders and field change orders, extending the system's life.
141
Why is it important to keep accurate records about security systems?
To help identify trouble spots, deficiencies, and justify system replacements.
142
What should maintenance records include for all components?
Components should be cross-referenced to subsystems to identify repair patterns.
143
Why should spare parts and repair equipment be procured in advance?
To minimize downtime in the event of remedial repairs.
144
Why is it recommended to standardize devices through sole-source vendor relationships?
To reduce inventory needs and training requirements.
145
What should maintenance manuals provided by the contractor include?
• I → Inspection • Perform → Preventive maintenance • Fixes → Fault diagnosis • Regularly → Repair/Replacement procedures This phrase reinforces the idea of consistently maintaining and fixing equipment.
146
What should be considered for preventive maintenance tasks to be performed adequately? Ch______ that include m_______ guidelines.
Checklists that incorporate equipment manufacturers' guidelines.
147
Why is it important to develop checklists for preventive maintenance tasks?
To ensure all necessary tasks are performed adequately and consistently.
148
Why should preventive maintenance be pursued simultaneously with remedial maintenance activities?
To conserve travel time and optimize maintenance efficiency.
149
What types of adjustments may have to be made periodically to security systems?
Adjustments to ensure effective operation like detection pattern modifications for sensors.
150
What should a regular test and maintenance program include for effective device operation?
Periodic equipment and circuit testing, backup power checks, and thorough equipment inspections.
151
What should be verified for the data and video transmission system during security system acceptance tests?
Installation, testing, and approval as specified.
152
What verification is required for remote devices during security system acceptance tests?
Functionality, communication with the monitoring center, and specified functions.
153
What needs to be verified about the video switcher during security system acceptance tests? FF and PS
Full functionality and proper software programming.
154
What is essential to verify for all system software functions during security system acceptance tests?
Correct operation.
155
What must be verified regarding electrical and mechanical controls during security system acceptance tests?
Designed functions are performed.
156
How should cameras aimed at the rising or setting sun be positioned during security system acceptance tests?
Aim sufficiently below the horizon to avoid viewing the sun.
157
What verification is needed for night assessment capabilities near assessment areas in security system acceptance tests?
Verification of capabilities, including headlight effects.
158
What must be verified to avoid picture rolling when cameras are switched during security system acceptance tests? S______ of cameras
Synchronization of cameras.
159
What should be checked for the alarm interface to the intrusion detection subsystem during security system acceptance tests? F and ACC for AP
Functionality and automatic camera call-up for alarm points.
160
What is the purpose of post-implementation testing for security systems?
To ensure proper system operation and conformance to specifications.
161
What is the purpose of physical security?
To protect assets, whether tangible or intangible.
162
What are the four basic functions of physical security strategy? CA Ob D e Ev (option but helps with R D-m) Re
• Controlling access • Observing • Detecting events • Evaluating (optional, but helps with response decision-making) • Responding
163
Define the concept of the four Ds in physical security.
Deter, detect, delay, and deny an adversary access.
164
What are the components of physical security measures? St El and Hu Co
Structural, electronic, and human components.
165
List examples of structural components in physical security. L L and L CPTED, B and F
Lighting, locks and landscaping CPTED, barriers and fencing
166
Name some examples of electronic components in physical security. Su AC I D S
Surveillance, access control, intrusion detection systems.
167
What are some examples of human components in physical security measures? SO F Vi Ma and In Ma Sy
Security officer force, visitor management, incident management systems.
168
Explain the importance of coordinating physical security components with the security functions.
To ensure a well-orchestrated integrated protection strategy.
169
Why is it crucial to address the relationship between security components and peripheral systems?
To prevent conflicts and ensure proper functioning.
170
What are some examples of peripheral systems in physical security planning?
Life safety systems, building controls, and IT infrastructure.
171
What is the purpose of a security survey?
To assess current security level, identify deficiencies, and recommend improvements.
172
Define adequacy in security measures.
Adequacy refers to meeting the appropriate level of security or protection.
173
What is a vulnerability in security terminology?
A weakness that can be exploited by an adversary.
174
How does a vulnerability assessment differ from a comprehensive risk assessment?
A vulnerability assessment focuses more on vulnerabilities, while a risk assessment covers assets, threats, and consequences.
175
What are some objectives of a vulnerability assessment? Id W, L of R S pts of F and In Re Ca
Identify weaknesses, lack of redundancy, single points of failure, and inadequate response capability.
176
What components are evaluated in a Physical Protection Systems (PPS) analysis?
PPS components at both component and system levels are evaluated.
177
What are some elements of a PPS analysis?
Elements include gathering information, reviewing documents, interviews, and evaluation testing.
178
What is the goal of a vulnerability assessment?
To identify weaknesses in PPS components related to security functions.
179
What is SWOT analysis?
A tool that assesses strengths, weaknesses, opportunities, and threats.
180
What are the five criteria of good reporting?
Accuracy, clarity, conciseness, timeliness, and slant or pitch.
181
Why should a survey report include positive and negative findings?
To focus on how security can be improved and why it's important.
182
What are considerations that may affect the effectiveness of automated assessment tools?
Qualifications of assessment personnel, cost, complexity, and inability to assess intangible factors.
183
Why should automated assessment tools not be relied upon as the sole process in a physical security assessment?
They may not account for all factors accurately and should be supplemented.
184
What does project management involve in the context of physical security?
Planning, organizing, monitoring, and controlling resources for security projects.
185
What distinguishes a project from ordinary operations?
Projects are temporary efforts with defined goals and objectives.
186
What are the goals of security projects?
Improve security management and assure operational effectiveness.
187
What areas should a security project ensure effectiveness in?
Only authorized access and secure management of public areas.
188
What should records of system tests include?
Test date, name of person conducting the test, and results.
189
What factors should a security manager consider for system replacement?
Cost of maintenance, lack of spare parts, obsoleteness of hardware/software, operating costs, reliability, new technologies, and features.
190
Where can additional information for Domain Five be found according to the text?
Protection of Assets - Physical Asset Protection Standard 243.
191
What 7 things should the factory test setup include during physical security predelivery testing? All SCC M E Se Co Ce Da Tr Li Lo Pro Sen Sim Se Po Con
• All SCC M E → All security control center monitoring equipment • Se → Sensors • Co Ce → Control center (security control center monitoring equipment) • Da Tr Li → Data transmission links • Lo Pro → Local processors • Sen Sim → Sensor simulators • Se → Sensors • Po Con → Portal configurations
192
What 8 pieces of equipment are needed for testing security video systems during physical security predelivery testing? VC with L Mo VR VS AIP P/T M Ca An Eq
• VC with L → Video cameras with lenses • Mo → Monitors • VR → Video recorder • VS → Video switcher • AIP → Alarm input panel • P/T M → Pan/tilt mount • Ca → Cabling • An Eq → Ancillary equipment
193
What should a customer require in a written report of factory testing during physical security predelivery testing? A report indicating A T P, R and Re of D noted
A report indicating all tests performed, results, and resolution of deficiencies noted.
194
What 5 things should the contractor provide to the customer before site acceptance testing begins? A report describing FT D C C and A S T P
A report describing functional tests, diagnostics, calibrations, certification, and approved site test procedures.
195
What 3 things should the contractor demonstrate during site acceptance testing? Co with CR Phy and Fu P R and C of N and F A rates
Compliance with contract requirements, physical and functional project requirements, and calculation of nuisance and false alarm rates.
196
When should the site acceptance test begin?
After receiving written approval from the customer.
197
What actions can the customer take during site acceptance testing if the system fails to perform as specified?
The customer may terminate testing at any time.
198
What should be considered when selecting countermeasures?
Effectiveness ………depending on adversary, different threat levels, increasing sophistication.
199
What are the components of structural security?
Elements like walls, doors, windows, roofs, floors, fencing, and barriers.
200
What types of safes are there in terms of protection?
Record safes for fire protection, safes for valuables protection.
201
What are the two general classes of locks?
Mechanical locks and electrified locking mechanisms.
202
What are the benefits of traditional mechanical locks and keys?
Low cost, simplicity, and reliability….despite modern access control systems.
203
What 6 elements are considered in professionally planned locking systems? LS Pl LP R-e Sys, C-o locks Co and bi locks
Lock system planning, locking policy, rapid-entry systems, credential-operated locks, combination and biometric locks.
204
What disciplines are involved in the study of lighting for security applications? LD En, and Te
Various disciplines like lighting design, engineering, and technology.