Cards 1-40 Flashcards

1
Q

Risk is measured by:

A

Determining the value of the asset in relation to the threats and vulnerabilities associated with it….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security risk rating =

A

Security risk rating =

asset value x threat likelihood x Severity of incident x Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Categories of assets exposed to risk?

A

Physical - facilities; operational & industrial control systems & on-site processes and assets.

Non-physical - geo-political landscape; culture, speed of decision making and intensity of competition;

Logical - information & digital assets and the network or digital space that connects them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The risk assessment process should be revisited?

A

cyclically and continuously because of the elements that are constantly subject to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The purpose of a security survey?

A

-determine current seurity posture
-IDentify deficiencies and excesses,
-compare current SP with what would be appropriate; and
-recommend improvements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When considering vulnerabilities, what 8 factors should be addressed?

A

-lack of backup for critical functions;
-single points of failure;
-co-location of critical systems, organizations and components;
-inadequate preparedness for attacks;
-too easy for an aggressor to attack the facility;
-inadequate security;
-presence of hazardous material
-potential for collateral damage from nearby companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security survey focuses more on vulnerabilities than a…..

A

Physical Security assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cost benefit analysis should be used in both a…….

A

Physical security assessment and a risk assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The five functions included in a functional approach to a physical security assessment include:

A
  • Security architecture and engineering;
  • Structural security measures;
  • C, P, T, E, D
  • Electronic Security Systems;
  • Security officers and the
    Human element
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Typical areas assessed in a physical security assessment include:

A

Barriers, doors, windows, openings;
-locks, safes and containers;
-signage; lighting; alarm and electronic systems;
-vehicle traffic and parking controls;
-visitor management;
-package handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Automated assessment tools should only assist in completing surveys because they…..

A
  • may give a false sense of knowledge;
    -may have a high cost;
    -may have complex software; and
  • they can’t capture unquantifiable characteristics.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Defense in depth?

A

An adversary must overcome a number of protective features in Sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why does each layer of security require a separate act by the adversary?

A

-causes Uncertainty in the perp’s mind;
-increases attack preparation time;
- adds steps to the intrusion and
-allows for more police or guard force response time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layered security should have i______ at each of the layers?

A

Interdependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Purposely left blank

A

Purposely left blank

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the principle of balanced protection?

A

-the protection system’s individual applications and components will be integrated and converged so that they provide an equal level of protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The appraisal component of the security survey involves…?

A

Developing and communicating recommendations for enhancements.

18
Q

What is the focus of a physical security assessment?

A

The risks to the physical assets and property of an organization and the protection measures (against any risk) that constitute the realm of physical security.

19
Q

The physical security assessment could provide the basis for …what?

A

A comprehensive & integrated security analysis and risk assessment;
-identifying security gaps;
-identifying a range of Solutions and their pros and cons; and
-assisting in the development of the org’s security risk management
continuity, response and recovery programs.

20
Q

What costs are considered in a cost-benefit analysis?

A

Technology;
Time
Opportunity;
Process;
Personnel; and
-Overall capability costs

21
Q

The 3 most common approaches to a physical security assessment?

A

Outside-inward approach;
Inside-Outward approach; and
Functional approach

22
Q

What is it called when the assessment team acts as the aggressor and moves from outside the facility through successive layers of security toward the asset?

A

Outside-inward physical security assessment approach

23
Q

When the assessment team acts as the defender and works from the asset out towards the outer perimeter it’s called….?

A

The inside-outward physical security assessment approach

24
Q

When the security assessment team evaluates security functions/disciplines and collates the findings from the assessment component it’s called?

A

The functional (security discipline) physical security assessment approach

25
Q

The five criteria of a good security survey report?

A

Accurate
Clear
Concise
Timely and
Slant or pitch

26
Q

The six objectives of physical access control include:

A

-deter intruders and deny covert/overt action;
-distinguish authorized from unauthorized;
-delay and prevent intrusion;
-detect and monitor actual intrusions;
-trigger incident response from security/police;

27
Q

An asset is anything with:

A

Tangible or intangible value

28
Q

Risk-analysis is a process for

A

identifying asset values, threats and vulnerabilities to determine risks.

29
Q

Two ways an asset’s criticality is determined?

A

-based on the org’s mission/goals and ;
-how the org would recover if the asset was no longer available.

30
Q

Three steps to identify an org’s assets are:

A

-Define Primary business functions;
-ID site/bldg infrastructure and systems; and;
-ID the org’s tangible & intangible assets.

31
Q

The two types of costs considered when valuing an asset are?

A

Direct and indirect costs

32
Q

Factors to consider in valuing assets:

A

-injuries related to facility damage
-Asset replacement costs;
-revenue loss BC of lost functions;
-whether there are backup systems
-availability of replacements;
- critical information value;
-impact on revenue and reputation

33
Q

When determining asset values, some direct costs are?

A

-Financial losses/value of goods;;
-insurance costs rise;
-insurance deductibles increase;
-lost business;
-higher labor costs;
-mgmnt time dealing with event;
- punitive court judgements not covered by insurance

34
Q

Indirect costs of asset value determination include:

A

-neg media coverage
-neg consumer perception;
- PR costs to improve image;
-insurance costs rise bc placed in a higher risk category;
-Have to pay higher wages to get workers;
-shareholder lawsuits for mismanagement;
-poor employee morale; higher turnover/ work stoppages.

35
Q

What legal & regulatory procedures should be part of a physical asset protection program?

A

-identify the legal and regulatory schemes the org uses with its assets/activities/functions/products/services/stakeholders/supply chain;
-determine how these schemes apply to its risks;
-ensure these schemes are taken into account in establishing, implementing & maintaining its physical asset protection program.

36
Q

Two types of assets include:

A

Tangible and intangible assets

37
Q

Assets can be valued in two ways:

A

-assigned a relative value based on Priority and
-apply a cost of loss formula;

38
Q

What is the cost of loss formula to calculate an asset value:

A

K=(cp + ct + cr + ci) - i

K= ttl cost of loss;
Cp-cost of permanent replacement
Ct-cost of temporary substitute;
Cr - total related costs (removal and installation)
Ci- lost income costs
I- available insurance or indemnity

39
Q

Two types of adversaries:

A

-one uses intrusion to get at an asset, and
-one who attacks from outside

40
Q

Two common physical security compliance metrics used in the public sector are:

A

-compliance of facilities and
-compliance of systems