Summary CPP cards Flashcards
What are the main purposes of testing physical security systems and technologies?
To ensure continuous monitoring for performance, effectiveness, and suitability.
What does the ASIS International Risk Assessment standard define security as?
The protection being provided against hazards, threats, risks, and menaces.
How can managers benefit from a Security Metrics Program?
They can v, a, c and m PC and SP
They can view, analyze, compare, and measure program components and staff performance.
What 5 pieces of knowledge can security professionals gain from effectively applying security metrics?
UP
I R
D P
A C and
Lev Se Ca
Understanding performance
Identifying risks
Discovering problems
Assessing compliance
Leveraging security capabilities
What are the key aspects included in designing a metrics program for security?
MF
T____, o____ and s_____ C E
Measurement framework,
technical, operational, and
strategic criteria evaluation.
What are the three key approaches to evaluating security metrics?
Effectiveness, efficiency, and strategic improvement aligned with organizational objectives.
What 6 questions should be considered when evaluating each element of the security program?
PF
SF
NP
P
T and
R
• PF → Primary functions
• SF → Secondary functions
• NP → Necessary procedures
• P → Processes
• T → Tools
• R → Resources
What is the basic tool for developing an understanding in physical security projects?
Security risk assessment or security survey.
What is the first step in a comprehensive risk assessment?
Identifying and valuing the organization’s assets.
What are the 6 categories that can increase assets’ exposure to the risk of loss?
P,S,P environment
HE
P and P and
CC
Physical environment,
social environment,
political environment,
historical experience,
procedures and processes, and
criminal capabilities.
What is a gap analysis used for in the risk assessment process?
To determine steps to i_____
An org’s r______ a______ capacity.
To determine steps to improve an organization’s risk assessment capacity.
What is the best method for monitoring and preparing to respond to security risks?
An ongoing risk assessment program.
What is the difference between qualitative and quantitative risk assessment?
Qualitative uses expert judgment, while quantitative uses probabilities and statistics.
When might using a blended approach for risk assessment be appropriate?
When combining elements of qualitative and quantitative analysis is most suitable.
What is the focus of a physical security assessment or security survey?
Risks to physical assets and property, along with protection measures.
What eight documents are typically included in a bid package?
C I
Dr
Sp
HS
BI
Li
T and C, and
S-s Info req
Contract information,
drawings,
specifications,
hardware schedules,
bidder instructions,
licenses,
terms and conditions, and
security-sensitive information requirements.
When should a bidder’s conference or site visit be scheduled?
One week after the Request for Proposal (RFP) is issued.
What are the three steps taken after receiving bids for a project?
EB for C to R
P a FE and
S a B
- Evaluate bids for conformance to requirements
- Perform a financial evaluation, and
- then select a bidder.
What are 3 pillars discussed during the initial kick-off meeting for a contract?
Setting the course for scope, schedule, and budget.
What activities are involved in managing the warranty period?
Initiating and evaluating warranty work conformance within the scope and schedule.
What is the focus of the initial phase of a security design project?
P&A to develop the B of D and resultant D D
Planning and assessment to develop the basis of design and resultant design documentation.
Why is it important to establish a security ‘basis of design’?
PR
Th
As
Vu
RA and
CDS
• PR → Project Requirements
• Th → Threats
• As → Assets
• Vu → Vulnerabilities
• R A → Risk Assessment
• CDS → Conceptual Design Solutions
What are 12 key elements considered in developing design criteria?
Co and St
Ca, Qu, and Pe,
Co, fe and op,
Cu, im, and mo, and
Re
Codes and standards,
Capacity, quality and performance,
Cost, features and operations,
culture, image, and monitoring, and
response.
What are the six elements of the management process in security projects?
IM
QM
RM
CM
RM and
PM
• IM – Integration Management
• QM – Quality Management
• RM – Resource Management
• CM – Communications Management
• RM – Risk Management
• PM – Procurement Management