Chapter 1: Introduction Flashcards

1
Q

Physical Security

A

The part of security concerned with physical measures that have been designed to protect people, equipment, materials, and documents from damage, loss, or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Procedure

A

A detailed instruction for carrying out security policies, often presented as lists or steps to take.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset

A

Anything of value to the organization. It can have tangible and/or intangible properties such as physical objects, people, or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ward

A

Prevents the use of an incorrect key entering or turning a lock mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Event

A

A noteworthy happening such as a security incident, safety situation, medical emergency, or similar occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Four Ds

A

Deter - always the first objective
Detect - must include assessment
Delay - begins after detection and communication to the response force
Deny - prevent access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adversary

A

An individual who has the intent to harm a person or facility. There are two types; an outsider and an insider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Neutralize

A

Cease the actions of an adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Defense-in-depth

A

Also referred to as layered protection or protection-in-depth, defense-in-depth is a fundamental concept used in physical security. It consists of placing multiple layers of concentric security features that provide 360-degree protection without gaps or weaknesses. It is important that each layer of security has the same level of protection all the way around the asset, including above and below the asset, which is referred to as having “Balanced Protection”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Barrier

A

A natural or manmade object designed to restrict or impede movement of animals, people, or vehicles and/or materials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access Control

A

The process of implementing perimeters to control and document people, vehicles, and materials for a protected area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Video Surveillance

A

A surveillance system that captures visual images and then transmits the images to monitors, recorders and control equipment. Includes CCTV (Closed circuit television) and network-based video systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Design Basis Threat (DBT)

A

The threat (tactics, weapons, tools, explosives, or expertise) against which assets must be protected. It is the design of the protective measures and procedures to prevent the threat from being successful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Critical Detection Point (CDP)

A

The CDP is the point where the delay time exceeds the response force time. Simply put, it is the time it takes for the detection and response functions to interrupt (stop) the adversary before they can compromise or destroy an asset (deny).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Facility

A

One or more buildings that are related by function and location to form an operating entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Concept of Design Elements

A

Facility layout and utilization
Protection strategy
Structural and electronic security systems
Security officer operations and other human support
Physical security program management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk Assessment

A

The process of assessing security-related risk from internal and external threats to the organization, its people, or its assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PPS

A

A Physical Protection System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Security Measure

A

A practice or device that is designed to protect people, assets, or information from damage, loss, or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Key Design Considerations for Planners

A
Placement of hazardous materials
Air intake and exhaust design
Utilities including; water, electric, natural gas, communications, sewer, drainage culverts, etc.
Neighboring facilities and operations
Contingency planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Threat

A

An indication or event that can result in a loss, damage, or unauthorized access to an asset. Can be terrorism, vandalism, theft, bombing, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Security Incident

A

An occurrence or action likely to impact assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cognitive Learning

A

Knowledge and theory applied to practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Affective Learning

A

Attitude/perception of cultures, adversary, and asset protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Psychomotor

A

Physical skills/hands-on training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

General Orders

A

General Orders are bodies of principles for the officer. They include items such as prohibiting smoking, eating, and personal cell phone use while on duty and how they will maintain their post, wear their uniform, and use company equipment.

27
Q

Special Ordes

A

Special Orders, conversely, may be developed to address special events such as a board meeting, holiday party, or public function. Special orders have a specific timeframe and scope.

28
Q

Post Orders

A

Post Orders, also known as Standard Operating Procedures (SOPs), are the most important document for the security force as it will list officer duties, explain any policies and procedures and provides a basis for training. Post orders should be written clearly and be easy to understand, using the following criteria as a guide:

Each order should deal with a single subject.
Each order should be concise.
Each order should be easy to understand.
Orders should be indexed based on content.
Orders should be available at every post.
Orders should contain a coordinated set of instructions (no contradictions).

29
Q

Four Main Areas Policies Address

A

General - general objectives, responsibilities of staff, accountability, reporting, auditing, etc.
People - workplace violence, emergency evacuation, prohibited items, security awareness, etc.
Property - acceptable use of equipment, investigations, key control, safeguarding property, etc.
Information - disclosure, marking, storage, handling, destruction of documents, etc.

30
Q

Policies

A

Statements of a principle that each employee must follow while performing business functions

31
Q

Procedures

A

Detailed instructions on how to perform daily work, often using a step-by-step process or a written list of duties.

32
Q

Three Main Areas Procedures Address

A

People - response to threats, evacuations, visitor management, employee access badging, etc.
Property - securing assets, marking property, key issuance, officer duties (post orders), etc.
Information - marking, storage, and destruction of information and technical surveillance countermeasures (anti-eavesdropping), etc.

33
Q

Metrics

A

Measures based on a reference, with two or more points (quantity over time) and that offers insight into performance, operations, or quality.

34
Q

Legal considerations

A

Are legally defensible and enforceable;
Comply with other organizational policies and procedures;
Follow best industry practices by demonstrating duty of care;
Conform to national, state, and local laws and regulations; and
Protect the staff and organization from lawsuits.

35
Q

Foreseeability

A

Events or actions that may cause loss, harm or damage, that are known, or should have been known, to the organization and/or the security officers before the event occurred

36
Q

Proximate Cause

A

When an officer is the immediate cause of an injury to a victim

37
Q

Breach of Duty

A

When officers engage in unreasonable conduct

38
Q

Failure to Adhere to Duty Guidleines

A

When officers engage in conduct beyond their duties

39
Q

Chapter 1 Key Points 1

A

The Four Ds of security: Deter, Detect, Delay, Deny

40
Q

Chapter 1 Key Points 2

A

Layered protection or protection in-depth (defense-in-depth) consists of multiple security measures around an asset.

41
Q

Chapter 1 Key Points 3

A

Balanced protection means that all protective measures are evenly deployed around an asset.

42
Q

Chapter 1 Key Points 4

A

Defense-in-Depth (Protection-in-Depth or Layered Security) when applied in a basic format has three layers of protection: 1) outer layer, 2) middle layer, and 3) inner layer.

43
Q

Chapter 1 Key Points 5

A

Design Basis Threat (DBT) is the basis of PPS design used to protect an asset by analyzing adversary skills, tools, tactics, and the pathway an adversary might use to compromise the asset.

44
Q

Chapter 1 Key Points 6

A

Critical Detection Point (CDP) is the point where the delay time exceeds the response force time.

45
Q

Chapter 1 Key Points 7

A

The Physical Protection System (PPS) should be balanced between the various forms of security measures (structural, electronic, and procedural) to be effective.

46
Q

Chapter 1 Key Points 8

A

Point security can be defined as any site where the outer perimeter is loosely controlled, and the primary focus is on individual buildings within the perimeter or spaces within the buildings.

47
Q

Chapter 1 Key Points 9

A

Area security is where the perimeter and entry portals have a higher level of control and security features.

48
Q

Chapter 1 Key Points 10

A

Performance criteria for each subsystem or component is based on the contribution the device or component makes to the overall PPS performance.

49
Q

Chapter 1 Key Points 11

A

Feature-based criteria relies the fact that the component is present, not on the performance of that feature or component.

50
Q

Chapter 1 Key Points 12

A

The security officer is tasked with protecting property, enforcing rules, and directing pedestrians and vehicular traffic.

51
Q

Chapter 1 Key Points 13

A

During a partial bomb evacuation, the security officer should focus on the floor involved with the suspected bomb, and the floors immediately above and below the floor involved.

52
Q

Chapter 1 Key Points 14

A

Contract security services are often less expensive than proprietary security officers.

53
Q

Chapter 1 Key Points 15

A

A simple formula that can be used to determine if an armed security officer is needed: 1) that there is a greater danger to life safety without the armed officer, and 2) the security officer may reasonably be expected to use fatal force.

54
Q

Chapter 1 Key Points 16

A

Learning can be separated into three distinct domains: 1) cognitive learning, 2) affective learning, and 3) psychomotor learning.

55
Q

Chapter 1 Key Points 17

A

Development = Education + Training + Guided Experience

56
Q

Chapter 1 Key Points 18

A

There are three kinds of orders that direct security officer operations: 1) general orders, 2) post orders, and 3) special orders.

57
Q

Chapter 1 Key Points 19

A

Post orders are the most important written document for the security force, because it lists officer duties, policies and procedures and provides a basis for training.

58
Q

Chapter 1 Key Points 20

A

Policies address four main areas: 1) general, 2) people, 3) property, and 4) information

59
Q

Chapter 1 Key Points 21

A

Procedures address three main areas: 1) people, 2) property, and 3) information

60
Q

Chapter 1 Key Points 22

A

Security policies are strategic principles that must be followed and require approval at the executive level.

61
Q

Chapter 1 Key Points 23

A

Security procedures are steps to accomplish day-to-day tasks in meeting policy requirements and change more often than policies. Post Orders (SOPs) are an example of security procedures.

62
Q

Chapter 1 Key Points 24

A

Security officers have two main types of metrics: 1) response metrics, and 2) training metrics.

63
Q

Chapter 1 Key Points 25

A

Training metrics comprise: 1) inward facing programs, and 2) outward-facing programs.