Chapter 1: Domain One: Security Fundamentals Flashcards

1
Q

Access Control

A

The control of persons, vehicles and materials through the implenmentation of security measures for a protected area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Alarm System

A

Combination of sensors, controls, and annunciators (devices that announce an alarm via sound, light, or other means) arranded to detect and report an intrustion or other emergency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset

A

Anything that has tangible or intangible value to the organziation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Auditor

A

Person with competence to conduct an audit. (ISO 9001:2011)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Closed-Circuit Television

A

(CCTV) See Video Surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Color Rendition Index

A

(CRI) A quantitative measure of 0 to 100 that indicates a light’s ablity to show a true color when compared to a reference source. A higher CRI number indicates a light’s ability to render a truer rendition of the color.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Conformity

A

Fulfillment of a requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Consequence

A

Outcome of an event affecting objectives. (ISO Guide 73:2009)

NOTE 1: An event can lead to a range of consequences.

NOTE 2: A consequence an be certain or uncertain and can have postive or negative effects on objectives.

NOTE 3: Consequences can be expressed qualitatively or quantitatively.

NOTE 4: Initial consequences can escalate through knock-on effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Continual Improvement

A

Recurring process of enchancing the physical assest protection management system (PAPMS) to achieve improvements in overall physical access protection (PAP) management performance consistent with the organizations’s PAP management policy.

NOTE: The process need not take place in all areas of activity simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Continuity

A

Strategic and tactical capability, pre approved by management, of an organziation to plan for and respond to conditions, situations, and events to continue operations at an acceptable predefined level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Corrective Action

A

Action to eliminate the cause of a detected nonconformity (ISO 14001:2004)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Crime

A

An act or omission that isin violation of a law forbidding or commanding it for which the possible penalties for an adult upon conviction include incarceration; for which a corporation can be penalized by a fine or forfeit; or for which a juvenile can be adjudged delinquient or transferred to criminal court for prosecution. The basic legal definition of cime is all punishable acts whatever the nature of the penalty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Crime Prevention Through Enviromental Design

A

(CPTED) An approach to reducing Crime or Security incidents through the strategic design of the built enviroment typically employing organizational, mechanical, and natural methods to control access, enhance natural surveillance and territoriality, and support legitmate activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Crisis

A

An unstable condition involving an impending aburpt or significant change that requires urgent attention and action to proect life, assets, property or the enviroment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Critical Activity

A

Any function or process that is essential for the organization to deliver its products and/or services. (ISO/PAS 22399:2007)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Criticality Analysis

A

A process designed to systematically identify and evaluate an organizations’s assets based on the importance of its mission or function, the group of people at risk, or the significance of a disruption on the continuity of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Denial

A

Frustration of an adversary’s attempt to engage in behavior that would constitute an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Detection

A

The act of discovering an attempt (successful or unsuccessful) to breach a secured perimeter (such as scaling a fence, opening a locked window, or entering an area without authorization).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Disruption

A

An intentional, unintentional, natural event that interrupts normal business functions, operations, or processes, whether anticipated or unanticipated.

NOTE: A disruption can be caused by either positive or negative factors that will disrupt normal functions, operations, or processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Document

A

Information and supporting medium. (ISO 9000:2000)

NOTE: The medium can be paper, magnetic, electronic, or optical computer disc; phtography or master sample; or a combination thereof.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Due Diligence

A

The care that a prudent person might be expected to exercise in the exmination and evaluation of risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Evacuation

A

Organized, phased, and supervised dispersal of people from dangerous or potentially dangerous areas. (ASIS International Business Continuity Guideline: 2005)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Event

A

Occurrence or change in a particular set of circumstances. (ISO Guide 73:2009)

NOTE 1: Nature, likelihood, and consequence of an event cannot be fully knowable.

NOTE 2: An even can be one or more occurrences and can have several causes.

NOTE 3: Likehood associated with the event can be determined.

NOTE 4: An event can consist of a non-concurrence of one or more circumstances.

NOTE 5: An event with a consequence is sometimes referred to as an “incident.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Executive Protection

A

Executive, or Personnel, Prorection (EP) is the process of safeguarding key people from harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Exercises

A

Evauluating physical asset protection (PAP) management programs, rehearsing the roles of team members and staff, and testing the recovery or continuity of an organization’s systems (such as technology, telephony, administration) to demonstrate PAP management competence and capablity.

NOTE 1: Exercises include activities performed for the purprose of training and conditioning team members and personnel in appropriate responses with the goal of achieving maximum performance.

NOTE 2: An exercise can involve invoking response and operational continuity procedures but is more likely to invovle the simulation of a response and/or operational continuity incident, announced or unannounced, in which participants role-play to assess what issues might arise prior to a real invocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

External Context

A

External enviroment in which the organization seeks to achieve its objectives. (ISO Guide 73:2009)

NOTE: External context can include:

The cultural, social, political, legal, regulatory, financial, technological, economic, natural, and competitive enviroment whether international, national, regional, or local;

Key driver and trends having impact on the objectives of the organization; and

Relationships with, and perceptions and values of, external stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Facility Infrastructure

A

Plant, machinery, equipment, property, buildings, vehicles, information systems, transportation facilities, and other items of infrastructure or plant and related systems that have a distinct and quantifiable function or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Hazard

A

Possible source of danager or conditions (physical or operational) that have a capacity to produce a particular type of adverse effect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Impact

A

Evaluated consequence of a particular outcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Incident

A

Event that has the capacity to lead to human, intangible, or physical loss or a disruption of an organization’s operations, services, or functions. If not managed, an incident can escalate into an emergency, crisis, or disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Intangible Asset

A

Assets that do have a physical from to protect (such as reputation, relationships, creditworthiness).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Intergrity

A

The property of safeguarding the accuracy and completeness of assets. (ISO/IEC 13335-1:2004)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Interested Party

A

Person or group having an interest in the performance or success of an organization. (ISO/PAS 22399:2007)

NOTE: The term includes people and groups with an interest in an organizatio, its activities, and its achievements, such as customers, clients, partners, employees, shareholders, owners, vendors, the local community, first responders, government agencies, and regulators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Internal Audit

A

Systematic, independent, and documented process for obtaining audit evidence and evauluating it objectively to determine the extent to which the management system audit crieria set by the organization are fulfilled.

NOTE: In many cases, particulary in smaller organizations, independence can be demonstrated by the freedom from responsiblitity for the activity being audited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Internal Context

A

Internal environment in which the organization seeks to achieve its objectives (ISO Guide 73:2009)

NOTE: Internal context can include:

Governance, organizational structure, roles, and accountabilities;

Policies, objectives, and the strategies that are in place to achieve them;

The capablities understood in terms of resources and knowledge (such as capital, time, people, processes, systems, and technologies);

Perceptions and values of internal stakesholders;

Information systems, informatoin flows and decision-making processes (both forma and informal);

Relationships with, and perceptions and values of, internal stakeholders;

The organizations’s culture;

Standards, guidelines, and models adopted by the organization; and

Form and extent of contractual relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Intrusion Detection System

A

(IDS) A system that uses sensors to detect an impending or actual security breach and to initiate an alarm or notification of the event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Investigation

A

A systematic and thorough examination or inquriy into something or someone and the recording of that examination in a report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Investigation Team Lead

A

(ITL) The person directly responsible for the team of personnel assigned to investigate an incident and has overall responsiblity for ensureing that an investigation is thorough, complete, and well documented in teh final report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Investigation Unit Manager

A

The person directly respobible for the investigative function in an organization, sometimes referred to as the project manager or case manager, who may hold the title of chief security officer, security director, director of investigations, director of human resources, or something similar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Lighting

A

Degree of illumination; also, the equipment, used indoors and outdoors, for increasing illumination - usually measued in lumens, lux, or foot-candle units.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Likelihood

A

Chance of something happening. (ISO GUide 73:2009)

NOTE 1: In risk mamagement terminology, the word “likelihood” is suded to refer to the chance of something happening, whether defined, measured, or determined objectively or subjectiviely, qualitatively, or quantitatively, and described using general terms or mathematically (such as a probability or a frequency over a given time period).

NOTE 2: The English term “likelihood” does not have a direct equivalent in some languages: instead, the equivalent of the term “probability” is often used. HOwever, in English, “probability” is often narrowly interpreted as a mathematical term. THerefor, in risk management terminology, “likelihood” is used with the intent that is should have the same broad interpretation as the term “probability” has in many languages other than English.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Lock

A

A piece of equiment used to prevent undesired opening, typically of an aperture (gate, window, byilding door, or vault door, for example), while still allowing opening by authrorized users.

43
Q

Management Plan

A

Cleraly defined and documented plan of action, typically covering the key personnel, resources, services, and actions needed to implement the incident management process.

44
Q

Mitigation

A

Limitation of any negative consequices of a particular incident.

45
Q

Nonconformity

A

Non-fulfillment of a requirement (ISO 9000:2005)

46
Q

Objective

A

Overall goal consisten with teh policy that an organization sets itself to achieve. (ISO 14001:2004)

47
Q

Organization

A

Group of people and facilities with an arrangement of responsibilities, authorities, and relationships.

NOTE: An organization can be a government or public entity, company, corporation, firm, enterprise, institution, charity, sole trade or association, or parts or combinations thereof.

48
Q

Organizational Resilience

A

Ongoing management and governance process supported by top management resourced to ensure that the neccesaary steps are taken to identify the root causes of potential disruptions and the likelihood and impact of potential losses; maintain viable adaptive, proactive, and reactive strategies and plans; and ensure stability and sustaainablity of activities/functions/products/services through planning, exercising, rehearsal, testing, training, maintenance, and assurance.

49
Q

PAP

A

Physical asset protection.

50
Q

PAPM

A

Physical asset protection management.

51
Q

PAPMS

A

Physical asset protection management system.

52
Q

PEST

A

See STEP

53
Q

Physical Security

A

That part of security concerned with physical measures designed to safeguard people; to prevent unauthorized access to equipment, facilities, material, and documents; and to safeguard them against a security incident.

54
Q

Policy

A

Overall intentions and direction of an organization as formally expressed by top management.

55
Q

PPS

A

Physical protection system.

56
Q

Preparedness

A

Activities, Programs, And systems developed and implemented prior to an incident that may be used to support and enchance mitigation of, response to, and recovery from disuptions, disasters, or emergencies.

57
Q

Prevention

A

Measures that enable an organization to avoid, preclude, or limit the likelihood and consequences of an event.

58
Q

Prevention Action

A

Action to eleminate the cause of a potential nonformity. (ISO 14001:2004)

59
Q

Procedure

A

Specified way to carry out an activity. (ISO 9000: 2008)

NOTE: Procedures

60
Q

Proprietary Security

A

Typically, a department within a company that procides security services for that company.

61
Q

Protection in Depth

A

The strategy of forming layers of protection for an asset.

62
Q

Protection Systems

A

The intergration of people, procesdures, equiment, and technology for the protection of assets.

63
Q

Record

A

Document stating results achieved or providing evidence of activities performed. (ISO 9000:2008)

64
Q

Residual Risk

A

Risk remaining after risk treatment. (ISO Guide 73:2009)

NOTE 1: Residual risk can contain unidentified risk.

NOTE 2: Residual risk can also be known as “retained risk.”

65
Q

Resilience

A

The adaptive capacity of an organization in a complex and changing evniroment.

NOTE 1: Resilience is the ability of an orgainzation to resist being affected by an event or the ability to return to an acceptable level of performance in an acceptable period of time after being affected by an event.

NOTE 2: Resilience is the capability of a system to maintain its functions and structure in the face of internal external change.

66
Q

Resilience Management

A

Systematic and coordinated activities and practices through which an orgainzation manages its operational risks and the associated potential threats and impacts therein.

67
Q

Resources

A

Any asset (human, physical, informatoin, or intangible), facilities, equipment, materials, products, or waste that has ptoential value and can be used.

68
Q

Response Plan

A

Documented collection of procedures and information tat is developed, complied, and maintained in readiness for use in an incident.

69
Q

Risk

A

Effect of uncertainty on objectivies. (ISO Guide 73:2009)

NOTE 1: An effect is a deviation from the expected either postive or negative.

NOTE 2: Objectives can have different aspects such as financial, health, safety, and environmental goals and can apply at different levels such as strategic, organization-wide, project, product, and process.

NOTE 3: Risk is often characterized by reference to potential events, consequiences, or a combination of these and how they can affect the achievement of objectives.

NOTE 4: Risk is often expressed in terms of a combination of the consequences of an event or a change in circumstances and the associated likelihood of occurrence.

70
Q

Risk Acceptance

A

Informed decision to take a particular risk. (ISO Guide 73: 2009)

NOTE 1: Risk acceptance can occur without risk treatment or during the process of risk treatment.

NOTE 2: Risk acceptance can also be a process.

NOTE 3: Risks accepted are subject to monitoring and review.

71
Q

Risk Analysis

A

Process to comprehend the nature of rsi and to determine the level of risk. (ISO Guide 73:2009)

NOTE: Risk analysi provides the basis for risk evaluation and decisions about risk treatment.

72
Q

Risk Appetite

A

Amount and type of rsik that an organization is prepared to pursue, retian, or take. (ISO Guide 73:2009)

73
Q

Risk Assessment

A

Overall process of risk identification, risk analysis, and risk evaluation. (ISO Guide 73:2009)

NOTE: Risk assessment involves the process of indentifying internal and external threats and vulnerablities, indentifying the probality and impact of an event arising from such threats or vulnerablities, defining ciritical funuctions necessary to continue the organizations’s operations, defining the controls in place necessary to educe exposure, and evaluating the cost of such control.

74
Q

Risk Criteria

A

Terms of refernce by which the significance of risk is assessed. (ISO Guide 73:2009)

NOTE: Risk Criteria can inlude associated cost and benefits, legal statutory requirements, socio-economic and evnironmental aspects, the concerns of statke holders, priorites, and other imputs to the assessment.

75
Q

Risk Management

A

Coordinated activities to direct and control an organization with regard to risk. (ISO Guide 73:2009)

NOTE: Risk management generally inculdes risk assessment, risk treatment, risk acceptance, and risk communication.

76
Q

Risk Reduction

A

Actions taken to lessen the probability, negative consqequiences, or both, associated with a risk. (ISO Guide 73:2009)

77
Q

Risk Tolerance

A

Organization’s readiness to bear the risk after risk treatments in order to achieve its objectives. (ISO Guide 73:2009)

NOTE: Risk tolerance can be limited by legal or reulatory requirements.

78
Q

Risk Transfer

A

Sharing with another party the burden of loss or benefit or gain for a risk. (ISO Guide 73:2009)

NOTE 1: Legal or statutory requirements can limit, prohibit, or mandate the transfer of certain risk.

NOTE 2: Risk transfer can be carried ot through insurance or other agreements.

NOTE 3: Risk transfer can create new risks or modify existing risks.

NOTE 4: Relocation of the osurce is not risk transfer.

79
Q

Risk Treatment

A

Process to modify risk (ISO Guide 73:2009)

NOTE 1: Risk treatment can invovle avoiding the risk by deciding not to start or continue with the activity that gives rise to the risk; taking or increasing risk in order to pursue an opportunity; removing the risk source; changing the likelihood; changing the consequences; sharing risk with another party or parties; and retaining the risk by informed choice.

NOTE 2: Risk treatments that deal with negative consequiences are sometines referred to as risk mitigation, risk elimination, risk prevention, and risk reduction.

NOTE: 3: Risk treatment can create new risks or modify existing risks.

80
Q

Security

A

The condition of being protected agaisnt hazards, threats, risks, or loss.

81
Q

Security Aspects

A

Those characteristics, elements, or properties that reduce the risk of unintentionally, intentionally, and naturally caused crisies and disasters that disrupt and have consequences on the products and services, orperation, critical assets, and continuity of the organization and its stakeholders.

82
Q

Security Manager

A

An employee or controactor with management-level responsbility for the security program of an organization or facility.

83
Q

Security Measure

A

A practice or device designed to protect people and prevent damage to, lost of, or unauthorized access to equipment, facilities, material, and information.

84
Q

Security Officer

A

An invdividual, in uniform or plain clothes, employee to protect assets.

85
Q

Security Survey

A

A thorough physical examination of a facility and its systems and procedures conducted to assess the current level of security, locate deficiencies, and guage the degree of protection needed.

86
Q

Site Hardening

A

Implementation of enchancement measures to make a site more difficult to penetrate.

87
Q

Source

A

Element which alone or in combination has the intrinsic potential to give rise to risk. (ISO Guide 73:2009)

NOTE: A risk source can be tangible or intangible.

88
Q

Stakeholder

A

Person or group having an interest in the performance or success of an orgainziation. (ISO/PAS 22399:2007)

NOTE: THe term includes persons and groups with an interest in an organization, its activities, and its achievements, such as customers, clients, partners, employees, shareolders, owners, vendors, the local community, first responders, government agencies, and regulators.

89
Q

Standard

A

Set of criteria, guidelines, and best practies that can be used to enhance the quality and reliability of products, services, or processes.

90
Q

Stand-off Distance

A

The distance bewtween the asset and the trehat; typically regarding an explosive threat.

91
Q

Social, Technological, Environmental, and Political Model

A

(STEP) Points out potential sources of threats. The security manager can then conduct an analysis to determine whether such threats are likely and where they may orginate.

92
Q

Strengths, Weakness, Opportuninties, and Threats

A

(SWOT) A model for Analyzing proposed organizational projects. The concept is to analyze an issue or proposal from each of the four points of view, thereby giving security management a profile of potential issues to address.

93
Q

Supply Chain

A

The linked set of resources and processes that begins the acquisition of raw material and extended through the delivery of products or services to the end user across modes of transport. The supply chain may include suppliers, vendors, manufacturing faciltiies, logistics provides, internal distribution centers, distributors, wholesalers, and other entities that lead to teh end user.

94
Q

Surveillance

A

Observation of a location, activity, or person.

95
Q

Tangible Assets

A

Generally, assets that can be seen, touched, or directly mesasured in physical form (such as people and property).

96
Q

Target

A

Detailed performance requirement applicable to the organization (or parts thereof) that arises from the objective and the needs to be set and met to achieve those objectives. (ISO 14001:2004)

97
Q

Testing

A

Activivies performed to evaluate the effectiveness or capabilities of a plan relative to specified objectives or measurement criteria. Testing usually involves exercises designed to keep teams and employees effective in thier duties and to reveal weaknessses in the prepardeness and response/continuity/recovery plans. (ASIS International Business Continuity Guideline: 2005)

98
Q

Threat

A

Potential cause of an unwanted incident whic may results in harm to individuals, assets, a system or organization, the environment, or the community.

99
Q

Throughput

A

The average rate of flow of people or vehicles through an access point.

100
Q

Top Management

A

Persons or group of people who directs and controls an organization at the highest level. (ISO 9000:2008)

NOTE: For example, directors, managers, and officers of an organization who can ensure that effective management systems, including financial monitoring and control systems, have been put in place to protect assets. earning capacity, and the reputation of the organization. (ANSI/ASIS SPC.1-2009)

101
Q

Video Survellance

A

A surveillance system in which a signal is transmitted to monitors/recording and control equipment. Includes closed-circuit television (CCTV) and netword-based video systems.

102
Q

Vulnerablity

A

Intrinsic properties of somethign that create susceptibility to a source of risk that can lead to a consequence. (ISO Guide 73:2009)

103
Q

Vulnerability Analysis

A

The process of identifying and quantifying vulnerabilities.

104
Q

Waste, Accidents, Error, Crime, Unethical Practices

A

(WAECUP) Can be used as a blueprint for developing security objectives.