Chapter 1 Flashcards
What is the Physical Security Professional (PSP) designation awarded for?
Demonstrating a comprehensive level of competence in physical security.
What can achieving the PSP designation provide you?
Respect, recognition, opportunities, and professional advancement.
What is physical security according to the study guide?
The In________ of P, P and E to s________ assets.
The integration of people, procedures, and equipment to safeguard assets.
What are The Four Ds of physical security?
Deter, Detect, Delay, Deny.
Why is it preferable to deter a criminal act in physical security?
To prevent the act from being attempted.
What is the function of Detection in physical security?
To include Assessment to be effective.
When was the American Society for Industrial Security formed?
In 1955.
What were men assigned to do in larger cities and towns in terms of physical security in the past?
To act as ‘watchmen’ to monitor access points and alert citizens of attacks.
What are the three techniques a supervisor can use to ensure post orders are understood?
Ask specific questions,
observe in application,
set up hypothetical situations.
How do policies differ from procedures in security operations?
Policies are strategic objectives, while procedures are detailed instructions for daily work.
What are the four main areas that policies in security operations address?
General, People, Property, Information.
What are the three main areas that procedures in security operations address?
People, Property (post orders), Information.
What is the responsibility of supervisors in the current trend of security force management?
Quality-Control (QC) and Quality-Assurance (QA).
What are the two measurable performance categories for security officers?
Response and training.
Give 2 examples of response metrics for security officers.
Guard force response time, and
Time to respond to customer requests.
Define point security in terms of site control.
Point security focuses on individual buildings within a loosely controlled outer perimeter.
How is area security defined in relation to site control?
Area security refers to a site with a higher level of control at the perimeter and entry portals.
What are 5 key considerations when designing a site or facility?
Hm
AI D
U
NF
CP
• HM → Hazardous materials
• AI → Air intake design
• U → Utilities
• NF → Neighboring facilities
• CP → Contingency planning
Explain the difference between performance criteria and feature-based criteria.
Performance criteria evaluate subsystems based on overall performance, while feature-based criteria rely on present features.
How do security programs typically assess the PPS effectiveness?
Many security programs use a combination of feature and performance criteria.
What are three contemporary challenges faced by security professionals?
S and G
E T
S E
Standards and guidelines,
emerging technology, and
security education.
What skills are required for protection officers in terms of technology?
Proficiency in computer programming,
managing technical platforms, and
multiple system usage.
What is a common security education standard for protection officers?
Certified Protection Officer (CPO) designation from the International Foundation for Protection Officers (IFPO).
Why is the human element essential in a protection program?
For Q-D M and V A
Human element is necessary for quick decision-making and value addition.
Explain the importance of security personnel in a protection program.
Despite costs, security personnel bring value and are critical to the organization’s mission.
What is Defense-in-Depth also known as?
Layered protection or protection-in-depth.
Describe Defense-in-Depth concept in physical security.
Using multiple layers of security features to provide 360-degree protection without gaps.
What is the significance of balanced protection in Defense-in-Depth?
Each security layer should have equal protection around the asset.
The purpose of exterior perimeter security measures is to secure the outermost boundaries with L____, F_____ and ID_______.
To secure the outermost boundaries with lighting, fencing, and intrusion detection.
What are the 5 core assets protected by Defense-in-Depth strategies?
M and O D
VC
P and P
PS
Mailroom and onsite delivery
Visitor controls
Policies and procedures,
password security.
How many main layers are typically used in a simple Defense-in-Depth approach?
Three main layers: outer, middle, inner.
What is the middle layer in Defense-in-Depth strategy?
Comprises the exterior of buildings and may include doors, windows, and walls.
Explain the concept of Inner layer in Security Defense-in-Depth.
Protects high-value assets with various security measures like access controls and surveillance.
What is the Design Basis Threat (DBT) used for in physical security (3 things)?
Identifies assets to be protected,
Identifies adversary skills, and
Identifies potential pathways used.
Define Critical Detection Point (CDP) in layered protection.
The point where detection and response time exceeds the time needed to compromise an asset.
What are the five elements to be considered in a physical security program design?
FL
PS
SS
OOp
PM
Facility layout,
protection strategy,
security systems,
officer operations,
program management.
What are 8 characteristics a security officer should possess?
Mighty Eagles Glide Calmly, Never Crashing.
• Mighty → Mentally stable and Mature (Emotionally)
• Eagles → Ethical nature and Excellent character
• Glide → Groomed (Neat appearance) and Guarded (Loyal disposition)
• Calmly → Courageous and Composed (Discipline)
List three aspects of behavior a security officer should have.
Courtesy, restraint, interest.
What are 3 common tasks that a security officer may be required to perform?
PP
ER
D P and VT
Protect property,
enforce rules,
direct pedestrian and vehicular traffic.
Why is the ability to perform well under stress essential for a security officer?
Some duties involve stressful incidents like fights between coworkers or active assailants.
What should a security officer focus on during a partial bomb evacuation?
Assist the evacuation by focusing on the floor involved with the suspected bomb.
What is a post log in the context of security officer duties?
A chronological record of events that occur at a single post each day.
Why is accurate record-keeping important for a security officer?
To d a and in,
In L and
MS
To document activities and incidents,
Inform leadership and
maintain security
What should be included in a security officer’s formal written reports?
Specific issues and information for leadership, communicated effectively and accurately.
Describe the difference between contract security officers and proprietary officers.
Organizations may use contract or proprietary officers, with proprietary offering more control, loyalty, and performance.
What is the equation used to summarize professional expertise?
Education + Training + Guided Experience = Development
What does a security officer’s development depend on?
Dependent upon his or her supervisor.
What 4 skills are required for effective security leadership according to the notes?
Counseling,
coaching,
collaboration, and
teaching skills.
What should training for security officers be based on….name 3 things?
RR,
CC and
UA
Regulatory requirements,
client contracts,
union agreements, etc.
List a few benefits of training for security officers mentioned in the notes.
Improved JP and M
Reduced T and L
Improved job performance and motivation
reduced turnover and liability.
What are some methods - 6 - mentioned for delivering training to security officers?
Distance-learning,
on-the-job training,
lectures,
mentoring,
job aids, and
case studies.
Name 6 ways organizations can maximize their training budget according to the notes?
Use free government/community training,
join professional organizations,
share materials,
purchase off-the-shelf programs,
outsource, and
seek grants.
What are four common topics that security officers train on according to the notes?
WP V
AS
I and
E
Workplace violence,
active shooter,
investigations, and
ethics, etc.
What are the three kinds of orders that direct security officer operations mentioned in the notes?
General orders, Post orders, Special orders.
What are Post Orders also known as?
Standard Operating Procedures (SOPs).
Why is monitoring the security function metric important?
It provides insight into the security function’s reputation and resource needs.
What 4 activities are important to track for the security function?
ABI
L or S C R,
K R and
P V
Access badge issuance,
lost or stolen card requests,
key requests, and
parking violations.
What is the baseline compliance requirement for inward-facing training metrics?
100 percent compliance is required for inward-facing training metrics.
What are 4 examples of outward-facing training metrics?
WVP and AST
SA and
IT S
Workplace violence prevention and active shooter training,
security awareness, and
IT security.
Why is it important to conduct customer satisfaction surveys for training?
To gather feedback and improve training quality based on participants’ experiences.
What 5 things should be checked by the legal department regarding incident response procedures?
LD
Co with bp, p and l, and
S P
Legal defensibility,
compliance with best practices, policies and laws, and
staff protection.
Explain the concept of foreseeability in security management.
Events or actions that may cause harm and were known or should have been known.
Define proximate cause as related to security officer responsibilities.
When an officer directly causes an injury to a victim.
What does breach of duty entail for security officers?
Engaging in unreasonable conduct and/or failing to adhere to duty guidelines.
What are some (3) benefits of using contract personnel as security officers?
Cost is usually lower than proprietary officers,
more flexibility, and
fewer administrative tasks.
When is a hybrid model of contract and proprietary security officers often used?
When seeking to benefit from positive aspects of both models.
What are the preemployment screening guidelines for security officers in terms of age for armed positions?
21 years of age.
What are some of the criteria for determining employment eligibility for security officers?
Legal working status,
verifiable identity,
previous addresses and phone numbers,
high school diploma,
criminal history check,
verified employment history, and
drug screening.
What are some (5) roles security officers fulfill during their employment?
PR/MR
EA
IA
LC and
PSS
Public relations/management representative,
enforcement agent,
intelligence agent,
legal consultant, and
physical security specialist.
What 4 factors should be considered when deciding whether to arm a security officer?
AL
Cost to t, e and i,
RR and
P and P
Additional liability,
Additional costs to train, equip and insure,
regulatory requirements, and
policies and procedures.
What responsibilities (5) does organizational management have when arming security officers?
Training,
selecting firearms and ammunition,
proper maintenance of firearms,
maintaining records, and
purchasing adequate liability insurance.
What are the three distinct learning domains that learning can be separated into?
Cognitive learning,
affective learning, and
psychomotor learning.
What are considerations for policies when arming security officers?
Carrying of PO-W
U-of-F conditions
W and A types, Acc
R and S of W, RK
St and Re
Carrying privately-owned weapons,
use-of-force conditions,
weapon and ammunition types, accountability,
return and storage of weapon, record keeping,
standards and regulations.