Application, Design, and Integration of Physical Security Systems Flashcards
What are the two foundational design principles?
The four Ds (deter, detect, delay, deny),
Layered security (defense in depth).
The point where the delay time remaining exceeds the response force time is known as what?
Critical Detection Point.
What is the term for the type of security where there is significant perimeter protection and entry is tightly controlled at a single portal?
Area security.
What is the term for the type of security where the outer perimeter is loosely controlled and the primary security focus is at an individual building or restricted area within?
Point security.
What are some conflicts that might arise in the design process for physical security measures?
Surveillance systems, sensors, door systems, and other access control measures may conflict with one another;
Safety and security objectives may not be the same;
Security goals may not align within organization’s mission or culture.
What concept is used in the security design process to describe all aspects – electronic, structural, human, and procedural - of a security system complementing and working with each other?
Balanced protection.
What is a key factor in the nature of the physical security design and strategy employed to meet protection objectives?
The type or use of the facility or asset being protected.
What are the two types of design criteria?
Performance criteria (elements chosen for their contribution to performance),
Feature criteria (elements chosen because certain features are required).
What type of design process selects elements and procedures according to the contribution they make to overall system performance?
Performance criteria.
What type of design process selects elements or procedures to satisfy requirements that certain items be present?
Feature criteria.
What are the five different aspects that need to be taken into account when developing security system procedures?
People,
Operations,
Maintenance,
Training and awareness,
Incident-based and exploratory investigations.
What are the nine basic factors to know from the onset in security design?
Governing codes and regulations,
Protection requirements,
Company, standards and guidelines
Type of construction,
Site layout,
Material selection,
Utilities,
Life safety,
Infrastructure.
What equation is used for calculating risk when developing a design?
Risk = Vulnerability X Threat X Asset Value
According to the US federal emergency management agency (FEMA) model, what are the two basic classifications of threats or hazards?
Natural and human-caused.
What is the design bases threat (DBT)?
A profile of the type, composition, capabilities, and methods (tactics, techniques, and procedures), as well as the goals, intent, and motivation of an adversary, upon which the security engineering and operations of a facility are-based.
What is a requirements document?
A requirements document identifies the primary reasons for implementing new measures or upgrading an old system. It is closely tied to the risk assessment by identifying the specific security measures to mitigate threats and reduce vulnerabilities.
The collection, review, and analysis of data relative to the facility where the system will be implemented is an integral part of which process?
Planning process.
What are the two important criteria in developing the objectives for implementing or upgrading the physical protection system (PPS)?
The objective must be clearly stated and it must be SMART.
What does SMART stand for?
Specific, Measurable, Aggressive but achievable, Realistic, Time-bounded (Source: IPPS)
Specific, Measurable, Attainable, Repeatable, Time-dependent (Source: PSP)
Other variations on these initials maintain the essential idea: that objectives, be clear, focused, and appropriate to the task.
What are some influencing characteristic factors to consider in physical security design?
Assets, under protection,
Building or facility type,
Surroundings,
Location,
Additional concerns, such as management support and resources.
According to CPTED security layering, where is the first layer of security?
The first layer should be at the perimeter of the property.
According to CPTED security layering, where is the second layer of security?
The second layer should be at the building exterior.
According to capital CPTED security layering, which layers are inside the building?
The third, fourth, and fifth layers.
The third layer should segregate authorized an unauthorized visitors.
The fourth layer should segregate generally accessible client areas from staff-only areas.
The fifth layer should further restrict staff access to highly sensitive areas.
What is crime prevention through environmental design (CPTED)?
An approach to reducing crime or security incidents through the strategic design of the built environment, typically employing organizational, mechanical, and natural methods to control access, enhance natural surveillance and territoriality, and support legitimate activity.
What are the three approaches of CPTED strategies?
Natural or architectural measures
Mechanical measures,
Organizational measures.
What is natural surveillance?
Natural surveillance is a capital CPTED strategy to increase visibilty, both interior–to-exterior and exterior-to-interior, to increase witness potential, foster a sense of exposure to the criminal element, and give advance visibilty to areas people are entering.
What is the “broken windows” theory?
This theory suggests that leaving broken windows or other decay markers unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian is observed.
What is compartmentalization?
Compartmentalization is a capital CPTED strategy to design multiple or concentric layers of security measures so that highly protected assets are behind multiple barriers. This is also known as protection-in-depth.
What are the four levels of integration?
Integrated electronic security systems,
Integrated physical security elements,
Integrated security programs,
Integration in enterprise risk management.
A successful security design integrates what three primary elements?
Architectural aspects,
Security systems,
Operational factors.
What does PSIM stand for?
Physical security information management.
What involves planning, organizing, and controlling resources on a project?
Project management.
What are four constraints on a project?
Project scope,
Schedule,
Budget,
Quality.
What are typical elements in the project management process for a physical protection system(PPS)?
Project concept,
Designing the project,
Managing the bid process,
Managing the implementation process,
Acceptance of work,
Initializing and managing the warranty process.
What are the two phases of system design principles?
Planning and assessment.
Technical security projects typically progress through which six tasks?
Risk analysis,
Conceptual (schematic),
Design development,
Construction documents,
Bidding,
Construction.
What is the term used to describe the outcome of the overall planning phase through a set of security requirements or objectives that is used as a basis of the eventual design?
Design basis.
The ground rules and guidelines for the design are referred to as what?
Design criteria.
What are the two phases in design and documentation?
Design development stage,
Construction documents phase.
What are the three sections of the procurement documents that are also known as contract (or bid) documents?
Contractual details,
Construction specifications,
Construction drawings.
The construction document (CD) phase package includes what five items?
CD drawings,
Specifications,
Bill of quantities,
Refined system budgets,
Contract terms and conditions.
What are the results of detailed specifications?
Final implementation reflects what was intended,
All bidders get the same complete understanding of requirements.
What does CADD stand for?
Computer-aided design drafting.
The table of related security devices is commonly known as what?
Hardware schedules.
What are the three types of cost estimates?
Budgetary estimates,
Preliminary design estimates,
Final design estimates.
What are the two possibilities for who will designed the system?
Customer or end-user,
Contractor or integrator.
An approximation of the cost of each alternative security solution prepared for budgeting and planning purposes is known as what?
Budgetary estimates.
What are the three different types of project estimates?
Budgetary,
Preliminary design,
Life cycle cost.
What are the seven procedures to be covered when creating a detailed estimate?
Identify PPS subsystems,
Identify other installation activities,
Develop list of components,
Establish components prices,
Formulate installation crews and establish productivity,
Identify required, special equipment and rates,
Use spreadsheet format.
Project scope document should have what 10 sections?
Executive summary,
Project benefits,
Project objectives,
Project scope,
Estimated project hours,
Estimated cost,
Estimated duration,
Assumptions,
Major risks,
Objectives.
What are the four stages of a project?
Project feasibility,
Project development,
Project execution,
Project closeout.
In which stage of the project should any changes to the project scope, deliverables, or activities be subject to a more systematic change process and submitted to a change review board (CRB)?
Stage three: Project execution.
What are the seven deliverables of the planning stage?
Risk assessment report,
Procurement method,
Budgetary estimate,
Selection of project manager,
Selection of project team,
Design criteria,
Contracting and legal requirements.
What are two types of physical barriers?
Natural barriers and structural barriers.
Examples of this type of barrier include fields, rivers, cliffs, marshes, and deserts.
Natural barriers.