Cards 1-40 Flashcards
Risk is measured by:
Determining the value of the asset in relation to the threats and vulnerabilities associated with it….
Security risk rating =
Security risk rating =
asset value x threat likelihood x Severity of incident x Vulnerability
Categories of assets exposed to risk?
Physical - facilities; operational & industrial control systems & on-site processes and assets.
Non-physical - geo-political landscape; culture, speed of decision making and intensity of competition;
Logical - information & digital assets and the network or digital space that connects them.
The risk assessment process should be revisited?
cyclically and continuously because of the elements that are constantly subject to change.
The purpose of a security survey?
-determine current seurity posture
-IDentify deficiencies and excesses,
-compare current SP with what would be appropriate; and
-recommend improvements.
When considering vulnerabilities, what 8 factors should be addressed?
-lack of backup for critical functions;
-single points of failure;
-co-location of critical systems, organizations and components;
-inadequate preparedness for attacks;
-too easy for an aggressor to attack the facility;
-inadequate security;
-presence of hazardous material
-potential for collateral damage from nearby companies
A security survey focuses more on vulnerabilities than a…..
Physical Security assessment
A cost benefit analysis should be used in both a…….
Physical security assessment and a risk assessment.
The five functions included in a functional approach to a physical security assessment include:
- Security architecture and engineering;
- Structural security measures;
- C, P, T, E, D
- Electronic Security Systems;
- Security officers and the
Human element
Typical areas assessed in a physical security assessment include:
Barriers, doors, windows, openings;
-locks, safes and containers;
-signage; lighting; alarm and electronic systems;
-vehicle traffic and parking controls;
-visitor management;
-package handling
Automated assessment tools should only assist in completing surveys because they…..
- may give a false sense of knowledge;
-may have a high cost;
-may have complex software; and - they can’t capture unquantifiable characteristics.
Defense in depth?
An adversary must overcome a number of protective features in Sequence
Why does each layer of security require a separate act by the adversary?
-causes Uncertainty in the perp’s mind;
-increases attack preparation time;
- adds steps to the intrusion and
-allows for more police or guard force response time.
Layered security should have i______ at each of the layers?
Interdependencies
Purposely left blank
Purposely left blank
What is the principle of balanced protection?
-the protection system’s individual applications and components will be integrated and converged so that they provide an equal level of protection.