Cards 1-40 Flashcards

1
Q

Risk is measured by d_______ the value of the a______ in relation to the t______ and v_______ associated with it.

A

Determining….
Asset
Threats and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security risk rating =
Asset v_______x
T______ L_______x
S_____ of in_____x
V______

A

Security risk rating = asset value x threat likelihood x
Severity of incident x
Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Categories of assets exposed to risk?
- P_____________;
-N_____________;
-L___________

A

Physical - facilities; operational & industrial control systems & on-site processes and assets.

Non-physical - geo-political landscape; culture, speed of decision making and intensity of competition;

Logical - information & digital assets and the network or digital space that connects them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The risk assessment process should be revisited c____ and c____ because of the elements that are constantly subject to change.

A

Cyclically and continuously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The purpose of s security survey?

-determine current s_____ p____;
-ID d_______ & ex__________;
-compare current SP with what would be appropriate; and
-r__________ i___________.

A

Security posture;
Deficiencies and excesses;

Recommend improvements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When considering vulnerabilities, what factors should be addressed?

-lack of b_____ for critical functions;
-single points of f______;
-co-location of c_____ systems, org_____ and c________
-inadequate preparedness for attacks;
-too easy for an a______ to attack facility;
-inadequate s______;
-presence of h_____ m______
-potential for collateral damage from n_______ companies

A

Backup;
Failure;
Critical systems, organizations and components;

Aggressor
Security
Hazardous material
Nearby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security survey focuses more on v______ than a physical s____ a_______

A

Vulnerabilities;
Security assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cost benefit analysis should be used in both a…….

P______S_______A____and a R____A_______

A

Physical security assessment and a risk assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The functions included in a functional approach to a physical security assessment include:

-Security a___ & e_____;
-S_______ security m_______;
-C_ _ _ _;
-E______S____S_____ and
-S______ O_____ and the h____E_____.

A

Security architecture and engineering;
Structural security measures;
CPTED
Electronic Security Systems;
Security officers and the
Human element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Typically areas assessed in a physical security assessment include:

-b……d……w…….o…..;
-l…..s…..and c……..;
-s…….L……a……and el…….sys……..
-veh……tra…….par……….controls;
-v…….mgmnt;
-p_______handling.

A

Barriers, doors, windows, openings;
-locks, safes and containers;
-signage; lighting; alarm and electronic systems;
-vehicle traffic and parking controls;
-visitor management;
-package handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Automated assessment tools should only assist in completing because they…..

-may give a f______s_____ of k___;
-may have a h____ c____;
-may have c_____s______; and
-can’t capture un_____ c_______

A
  • may give a false sense of knowledge;
    -may have a high cost;
    -may have complex software; and
  • they can’t capture unquantifiable characteristics.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Defense in depth?

An adversary must overcome a number of protective features in S_________

A

Sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why does each layer of security require a separate act by the adversary?

-causes U_____ in the perp’s mind;
-increases a___ p_____ t_____;
- adds s____ to the in______; and
-allows for more p____r____t____.

A

Uncertainty;
-attack prep time;
-steps to the intrusion; and
-police response time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layered security should have i______ at each of the layers?

A

Interdependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Purposely left blank

A

Purposely left blank

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the principle of balanced protection?

-the protection system’s individual applications and components will be in_____ and con_____ so that they provide an equal level of protection.

A

Integrated & converged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The appraisal component of the security survey involves Dev_____ and com______ recommendations for enhancements

A

Developing and communicating

18
Q

What is the focus of a physical security assessment?

The risks to the physical a____ & pr_____ of an organization and the pr____ m____ (against any risk) that c______ the realm of physical security.

A

Assets & property;
Protection measures
Comprise

19
Q

The physical security assessment could provide the basis for …what?

A c______ & in______ security a____ and risk a______;
-identify s____g_____;
-identify a range of S____ and their pros and cons; and
-assist in the development of the org’s s____r_____m____ co____, re____ and re____programs.

A

Comprehensive & integrated security analysis and risk assessment
-identify security gaps;
-identify a range of solutions

-security risk management continuity, response and recovery programs

20
Q

What costs are considered in a cost-benefit analysis?

-T___
-O____
-P____
-T___
-P____
-O______c_______ costs

A

Technology;
Opportunity;
Process;
Time;
Personnel; and
-Overall capability costs

21
Q

The 3 most common approaches to a physical security assessment?

O______ I_____ approach;
I_______O_____approach; and
F______ approach

A

Outside-inward approach;
Inside-Outward approach; and
Functional

22
Q

What is it called when the assessment team acts as the aggressor and moves from outside the facility through successive layers of security toward the asset?

A

Outside-inward physical security assessment approach

23
Q

When the assessment team acts as the defender and works from the asset out towards the outer perimeter it’s called….?

A

The inside-outward physical security assessment approach

24
Q

When the security assessment team evaluates security functions/disciplines and collates the findings from the assessment component it’s called?

A

The functional (security discipline) physical security assessment approach

25
Q

The five criteria of a good security survey report?

-a
-c
-c
-t
-s____ or p______

A

Accurate
Clear
Concise
Timely and
Slant or pitch

26
Q

The objectives of physical access control include:

-D____ i_______;
-Distinguish a____ from un____;
-D___ and P_____ intrusion;
-D__and m____ actual intrusions;
-t__incident response to security;
- deny c___/o_____ action

A

-deter intruders;
-distinguish authorized from unauthorized;
-delay and prevent intrusion;
-detect and monitor actual intrusions;
-trigger incident response from security/police;
-deny covert/overt action

27
Q

An asset is anything with t_____ or in______value

A

Tangible or intangible value

28
Q

Risk-analysis is a p_____ for identifying a_____ v____, th____ and v______ to determine risks.

A

Process;
Asset values, threats and
Vulnerabilities…..

29
Q

Two ways an asset’s criticality is determined?

-based on the org’s m___/g____;
-how the org would recover if the a_____ was no longer available.

A

Mission/goals;

Asset

30
Q

Three steps to identify an org’s assets are:

-Define P_____ b____ f______;
-ID site/bldg in______ & s_______;
-ID the org’s t_____ & in_____ assets.

A

Primary business functions;

Infrastructure and systems;

Tangible and intangible assets

31
Q

The two types of costs considered when valuing an asset are?

D_______ costs and In____ costs

A

Direct and indirect costs

32
Q

Factors to consider in valuing assets:

-injuries related to f___ d____;
-Ass____re______ costs;
-rev____ loss BC of lost functions;
-whether there are b____ s_____
-av____ of replacements;
- cr_____ in_______ value;
-impact on r____ and r______

A

-facility damage;
-asset replacement;
-revenue;
Backup systems;
Availability of ;
Critical information;
Revenue and reputation

33
Q

When determining asset values, some direct costs are?

-F___l____/va_____ of g____ds;
-ins_____ costs rise;
-ins_____ de_____ increase;
-lost b____;
-higher l_____ c_____;
-mgmnt time d_____ with event;
- punitive c____j_____ not covered by insurance

A

Financial losses/value of goods;
-insurance;
-insurance deductibles;
-lost business;
-labor costs;
-dealing with event;
-court judgements not….

34
Q

Indirect costs of asset value determination include:

-neg m_____ c_____;
-neg c_____ p_____;
- PR costs to i_____ i_____;
-insurance costs rise bc placed in a higher r_____ c_____;
-Have to pay h____ w_____ to get workers;
-shareholder lawsuits for mis______;
-poor e___ m___; higher t____/ work st_______.

A

Media coverage;
-consumer perception;
Improve image;
Risk category;
Higher wages;
Mismanagement;
Employee morale; turnover/ work stoppages.

35
Q

What legal & regulatory procedures should be part of a physical asset protection program?

-identify the legal and regulatory schemes the org uses with its assets/activities/functions/products/services/stakeholders/supply chain;
-determine how these s_____ apply to its risks;
-ensure these s____ are taken into account in est____ im____ & m_____ its physical asset protection program.

A

Schemes;
Schemes;
Establishing….implementing…….and maintaining

36
Q

Two types of assets include:

T_______ and in________

A

Tangible and intangible

37
Q

Assets can be valued in two ways:

-assigned a r___ v_____ based on P_____ and….
-apply a c____ of l______ formula;

A

Relative value…..priority;

And

Cost of loss formula

38
Q

What is the cost of loss formula to calculate an asset value:

A

K=(cp + ct + cr + ci) - i

K= ttl cost of loss;
Cp-cost of permanent replacement
Ct-cost of temporary substitute;
Cr - total related costs (removal and installation)
Ci- lost income costs
I- available insurance or indemnity

39
Q

Two types of adversaries:

-one uses in_______ to get at an asset, and
-one who a_____ from o_____

A

Intrusion;

Attacks from outside

40
Q

Two common physical security compliance metrics used in the public sector are:

-compliance of f______ and
-compliance of s_______

A

facilities &

Systems