Cards 81-118 Flashcards
- What data goes into an incident management system?
Loss event history
Threat frequency analysis
single and Annual loss expectancy and;
Impact assessment
- What tests should be part of a security survey?
Shipping and receiving;
Alarms;
Computer/server room security
general access controls
- When performing security system and procedure tests as part of a security survey, you should coordinate with:
building Owner/manager/landlord;
Any involved Outside agencies
- During a security survey test on shipping and receiving, these should be checked:
-Controls are checked by physical observation of selected shipments (incoming and outgoing) against bills of lading of inventory records.
- During a security survey test on alarms, what is evaluated?
the Response as well as the reaction of building occupants and security officers
- During a security survey test on a computer room or server room, these should be tested:
Security;
Access controls during both working and off hours.
- How are general access controls tested during a security survey?
“intruders” should test if they get access to the facility or internal areas during business and off hours;
-do employees challenge the intruders
- How should areas, items and issues be evaluated during a security survey?
In terms of the appropriateness for the
Situation, Age, Operability, Maintenance, Interoperability, Aesthetics and Consistency with the current use or space.
- What four things should be reviewed when assessing key/card security during a security survey?
Accountability and policy;
record Keeping and inventory;
Recovery procedures (for keys); and
whether changed when Appropriate, ie people leave, thefts, burglary
- Besides windows and doors, what other openings should be assessed during a security survey?
Manholes;
Skylights;
Roof hatches;
Ventilator, air conditioning vents/shafts;
-Penthouse; veranda access;
-sidewalk grates
- When assessing the protection of utilities during a security survey, what should be examined?
Location and physical protection;
Access control;
Backup and emergency
Protection of telecommunications and data lines.
- The first step in a risk assessment is:
Identification and valuation of assets
- What are the four D’s?
Deter
Detect
Delay
Deny
- What are the five risk treatments:
Acceptance;
Transfer;
Spreading;
Avoiding;
Mitigating;
- The seven functions of physical security?
Access control
Deterrence
Detection
Assessment
Delay
Response and
Evidence gathering