Chapter 1 Flashcards

1
Q

What is the Physical Security Professional (PSP) designation awarded for?

A

Demonstrating a comprehensive level of competence in physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can achieving the PSP designation provide you?

A

Respect, recognition, opportunities, and professional advancement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is physical security according to the study guide?

The integration of p, p and e to…..

A

The integration of people, procedures, and equipment to safeguard assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are The Four Ds of physical security?

A

Deter, Detect, Delay, Deny.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it preferable to deter a criminal act in physical security?

A

To prevent the act from being attempted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the function of Detection in physical security?

A

To include Assessment to be effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When was the American Society for Industrial Security formed?

A

In 1955.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What were men assigned to do in larger cities and towns in terms of physical security in the past?

A

To act as ‘watchmen’ to monitor access points and alert citizens of attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three techniques a supervisor can use to ensure post orders are understood?

A

Ask specific questions, observe in application, set up hypothetical situations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do policies differ from procedures in security operations?

A

Policies are strategic objectives, while procedures are detailed instructions for daily work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four main areas that policies in security operations address?

A

General, People, Property, Information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three main areas that procedures in security operations address?

A

People, Property (post orders), Information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the responsibility of supervisors in the current trend of security force management?

A

Quality-Control (QC) and Quality-Assurance (QA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two measurable performance categories for security officers?

A

Response and training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give examples of response metrics for security officers.

A

Guard force response time, response to customer requests time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define point security in terms of site control.

A

Point security focuses on individual buildings within a loosely controlled outer perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How is area security defined in relation to site control?

A

Area security refers to a site with a higher level of control at the perimeter and entry portals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some key considerations when designing a site or facility?

A

Consider hazardous materials, air intake design, utilities, neighboring facilities, and contingency planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain the difference between performance criteria and feature-based criteria.

A

Performance criteria evaluate subsystems based on overall performance, while feature-based criteria rely on present features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do security programs typically assess the PPS effectiveness?

A

Many security programs use a combination of feature and performance criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some contemporary challenges faced by security professionals?

A

Standards and guidelines, emerging technology, and security education are major challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What skills are required for protection officers in terms of technology?

A

Proficiency in computer programming, managing technical platforms, and multiple system usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a common security education standard for protection officers?

A

Certified Protection Officer (CPO) designation from the International Foundation for Protection Officers (IFPO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is the human element essential in a protection program?

A

Human element is necessary for quick decision-making and value addition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Explain the importance of security personnel in a protection program.

A

Despite costs, security personnel bring value and are critical to the organization’s mission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Defense-in-Depth also known as?

A

Layered protection or protection-in-depth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Describe Defense-in-Depth concept in physical security.

A

Using multiple layers of security features to provide 360-degree protection without gaps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the significance of balanced protection in Defense-in-Depth?

A

Each security layer should have equal protection around the asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Explain the purpose of exterior perimeter security measures.

A

To secure the outermost boundaries with lighting, fencing, and intrusion detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the core assets protected by Defense-in-Depth strategies?

A

Policies and procedures, visitor controls, mailroom, onsite delivery, password security.

31
Q

How many main layers are typically used in a simple Defense-in-Depth approach?

A

Three main layers: outer, middle, inner.

32
Q

What is the role of the middle layer in Defense-in-Depth strategy?

A

Comprises the exterior of buildings and may include doors, windows, and walls.

33
Q

Explain the concept of Inner layer in Security Defense-in-Depth.

A

Protects high-value assets with various security measures like access controls and surveillance.

34
Q

What is the Design Basis Threat (DBT) used for in physical security?

A

Identifying assets to be protected, adversary skills, and potential pathways used.

35
Q

Define Critical Detection Point (CDP) in layered protection.

A

The point where detection and response time exceeds the time needed to compromise an asset.

36
Q

What are the five elements to be considered in a physical security program design?

A

Facility layout, protection strategy, security systems, officer operations, program management.

37
Q

What are some characteristics a security officer should possess?

A

Mentally stable, emotionally mature, good character, ethical, neat appearance, loyalty, courage, discipline.

38
Q

List three aspects of behavior a security officer should have.

A

Courtesy, restraint, interest.

39
Q

What are some tasks that a security officer may be required to perform?

A

Protecting property, enforcing rules, directing pedestrian and vehicular traffic.

40
Q

Why is the ability to perform well under stress essential for a security officer?

A

Some duties involve stressful incidents like fights between coworkers or active assailants.

41
Q

What should a security officer focus on during a partial bomb evacuation?

A

Assist the evacuation by focusing on the floor involved with the suspected bomb.

42
Q

What is a post log in the context of security officer duties?

A

A chronological record of events that occur at a single post each day.

43
Q

Why is accurate record-keeping important for a security officer?

A

To document activities and incidents, maintain security, and inform leadership.

44
Q

What should be included in a security officer’s formal written reports?

A

Specific issues and information for leadership, communicated effectively and accurately.

45
Q

Describe the difference between contract security officers and proprietary officers.

A

Organizations may use contract or proprietary officers, with proprietary offering more control, loyalty, and performance.

46
Q

What is the equation used to summarize professional expertise?

A

Education + Training + Guided Experience = Development

47
Q

What does a security officer’s development depend on?

A

Dependent upon his or her supervisor.

48
Q

What skills are required for effective security leadership according to the notes?

A

Good coaching, collaboration, teaching, and counseling skills.

49
Q

What should training for security officers be based on?

A

Regulatory requirements, client contracts, union agreements, etc.

50
Q

List a few benefits of training for security officers mentioned in the notes.

A

Improved job performance, increased motivation, reduced turnover, decreased liability.

51
Q

What are some methods mentioned for delivering training to security officers?

A

Distance-learning, on-the-job training, lectures, mentoring, job aids, case studies.

52
Q

How can organizations maximize their training budget according to the notes?

A

Use free government/community training, join professional organizations, share materials, purchase off-the-shelf, outsource, seek grants.

53
Q

What are some common topics that security officers often train on according to the notes?

A

Workplace violence, active shooter, investigations, ethics, etc.

54
Q

What are the three kinds of orders that direct security officer operations mentioned in the notes?

A

General orders, Post orders, Special orders.

55
Q

What are Post Orders also known as?

A

Standard Operating Procedures (SOPs).

56
Q

Why is monitoring the security function metric important?

A

It provides insight into the security function’s reputation and resource needs.

57
Q

What activities are important to track for the security function?

A

Access badge issuance, lost or stolen card requests, key requests, parking violations.

58
Q

What is the baseline compliance requirement for inward-facing training metrics?

A

100 percent compliance is required for inward-facing training metrics.

59
Q

What are examples of outward-facing training metrics?

A

Active shooter training, security awareness, workplace violence prevention, IT security.

60
Q

Why is it important to conduct customer satisfaction surveys for training?

A

To gather feedback and improve training quality based on participants’ experiences.

61
Q

What should be checked by the legal department regarding incident response procedures?

A

Legal defensibility, compliance with policies, best practices, laws, and staff protection.

62
Q

Explain the concept of foreseeability in security management.

A

Events or actions that may cause harm and were known or should have been known.

63
Q

Define proximate cause as related to security officer responsibilities.

A

When an officer directly causes an injury to a victim.

64
Q

What does breach of duty entail for security officers?

A

Engaging in unreasonable conduct or failing to adhere to duty guidelines.

65
Q

What are some benefits of using contract personnel as security officers?

A

Cost is usually lower than proprietary officers, more flexibility, fewer administrative tasks.

66
Q

When is a hybrid model of contract and proprietary security officers often used?

A

When seeking to benefit from positive aspects of both models.

67
Q

What are the preemployment screening guidelines for security officers in terms of age for armed positions?

A

21 years of age.

68
Q

What are some of the criteria for determining employment eligibility for security officers?

A

Legal working status, verifiable identity, previous addresses and phone numbers, high school diploma, criminal history check, verified employment history, drug screening.

69
Q

What are some roles security officers fulfill during their employment?

A

Public relations/management representative, enforcement agent, intelligence agent, legal consultant, physical security specialist.

70
Q

What factors should be considered when deciding whether to arm a security officer?

A

Additional liability, costs to train, equip, insure, regulatory requirements, policies and procedures.

71
Q

What responsibilities does organizational management have when arming security officers?

A

Training, selecting firearms and ammunition, proper maintenance of firearms, maintaining records, purchasing adequate liability insurance.

72
Q

What are the three distinct learning domains that learning can be separated into?

A

Cognitive learning, affective learning, psychomotor learning.

73
Q

What are considerations for policies when arming security officers?

A

Carrying privately-owned weapons, use-of-force conditions, weapon and ammunition types, accountability, return and storage of weapon, record keeping, standards and regulations.