Chapter 3: Planning and Conducting Physical Security Assessments Flashcards

1
Q

What is the first step when conducting a security risk assessment?

A

identify the assets the company is trying to protect, the threats against those assets, and how vulnerable the assets are to the various threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 steps of a comprehensive risk assessment?

A
  1. Identify and place value on the organizations assets.
  2. Evaluate relevant risks to the assets
  3. Conduct a vulnerability assessment
  4. consider the potential impact to the organization if the asset is lost.
  5. recommend risk mitigation measures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three categories that tend to increase assets exposure to the risk of loss?

A
  1. Physical
  2. Non Physical
  3. Logical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some examples of physical factors that can increase an assets exposure to the risk of loss?

A
  1. Types and locations of facilities or campuses
  2. surroundings
  3. amount of pedestrian or vehicular traffic
  4. the amount of non-employee access needed.
  5. the operational tech or industrial control systems needed for the organization to operate
  6. the sensitivity and criticality of on-site processes and assets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some examples of nonphysical factors that can increase an assets exposure to the risk of loss?

A
  1. geo political landscape
  2. culture
  3. industry pressures
  4. legal, regulatory and compliance requirements
  5. intensity of competition
  6. organizational growth mode
  7. speed of decision making
  8. willingness to adopt technology.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some examples of logical factors that can increase an assets exposure to the risk of loss?

A
  1. network infrastructure
  2. network connectivity
  3. servers
  4. workstations
  5. network devices and endpoints.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False. The risk assessment process is meant to be a cyclical and continuous effort.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the definition of Qualitative Analysis?

A

any approach that does not use numbers or numeric values to describe the risk components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the definition of Quantitative Analysis

A

any approach that uses numeric measures to describe the value of assets or the level if threats, vulnerabilities impact, or loss events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Qaulitative Analysis method best suited for?

A

Evaluating basic security applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Quantitative Analysis method best suited for?

A

to measure the effectiveness of a physical protection system whose primary functions are to detect, delay, and respond.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an asset?

A

Anything that has tangible or intangible value to an enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What factors can asset value be based on?

A
  1. The cost of purchasing the asset or its replacement cost.
  2. operational impact of unavailability of the asset.
  3. The effects of harm to the asset
  4. The length of time required to replace the asset
  5. The reputational impact from unavailability of the asset.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What process determines the operational impact of the unavailability of an asset?

A

business impact analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some factors to consider in determining asset value?

A
  1. immediate response and recovery costs
  2. Investigation Costs
  3. replacement costs
  4. indirect costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some examples of indirect costs?

A
  1. temporary leased facilities
  2. equipment rental/purchase
  3. alternative suppliers/vendors
  4. alternative shippers/logistic support
  5. temporary warehousing facilities
  6. special employee benefits
  7. counseling/employee assistance
  8. loss of market share (temporary or permanent)
  9. decreased employee productivity
  10. increased insurance premiums
  11. temporary workforce/ staffing
  12. recruiting/staffing costs for the permanent workforce
  13. increased security costs (temporary or permanent)
  14. increased communications capabilities
  15. data recovery/ IT system restart and/ or reconfiguration
  16. administrative support
  17. increased travel
  18. marketing/ public relations efforts
  19. emergency/continuity plan revamps
17
Q

What is the cost-of-loss-formula?

A

K=Cp+Ct+Cr+Ci-I

K= total cost of loss

Cp= cost of permanent replacement

Ct= cost of temporary substitute

Cr= total related costs (remove asset, install new, etc. )

Ci= lost income cost

I= available insurance or indemnity

18
Q

What is a threat?

A

any verbal or physical conduct that conveys an intent or is reasonably perceived to convey an intent to cause physical harm or to place someone in fear of physical harm.

19
Q

What are the different types of threats?

A
  1. Man Made
  2. Natural
20
Q

Who should adversaries be judged when assessing manmade threats?

A

on their ability to cause a loss event and their intentions to do so.

21
Q

What is the definition of vulnerability?

A

The state of being susceptible to harm or injury.

22
Q

What two factors are considered when evaluating vulnerability?

A

Observability and Exploitability

23
Q

What is the definition of observability?

A

the ability of an adversary to see and identify a vulnerability.

24
Q

What is the definition of Exploitability?

A

The ability of the adversary to take advantage of the vulnerability once aware of it.

25
Q

What is the risk analysis formula?

A

Risk= (Threat x Vulnerability x Impact)1/3

26
Q

What is the ASIS definition of a security survey?

A

A thorough physical examination of a facility and its systems and procedures, conducted to assess the current level of security, locate deficiencies, and gauge the degree of protection needed.

27
Q

What is the purpose of a security survey?

A
  1. Determine and document the current security posture.
  2. Identify deficiencies and excesses in existing security measures.
  3. compare the current posture with a determination of the appropriate level of security or protection needed.
  4. recommend improvements in the overall situation.
28
Q

What does a security survey place more emphasis on?

A

Vulnerabilities.

29
Q

What are 8 factors to address when considering vulnerabilities?

A
  1. lack of redundancy or backups for critical functions or systems.
  2. single points of failure.
  3. collocation of critical systems organizations, or components.
  4. inadequate response capability to recover from an attack.
  5. ease of aggressor access to a facility.
  6. inadequate security measures in place.
  7. presence of hazardous materials.
  8. potential for collateral damage from other companies in the area.
30
Q

What is the Outside-Inward Methodology?

A

An assessment team takes on the role of an adversary (perpetrator) attempting to penetrate the physical defenses of a facility (penetration test). The team begins outside the facility where the public has free reign and then works their way into the center of the organization.

31
Q

What is the Inside-Outward Methodology?

A

When the assessment team takes on the role of the security professional (defender). They work from the asset or target out toward the outer perimeter.

32
Q

What are some examples of the different types of security layers?

A
  1. asset/target (sensors, alarms, surveillance)
  2. container, safe, or vault (walls/side, locks, sensors, alarms)
  3. controlled/restricted area (walls, doors, locks, surveillance, sensors)
  4. security desk/entry control point (security office, turnstile, access control)
  5. building perimeter (walls, doors, locks, surveillance, sensors)
  6. secure compound/ campus (surveillance, distance, lighting, patrol)
  7. property perimeter/ fence line (sensors, entry control, patrols, barriers)
  8. neighborhood/ surrounding area (police patrols, neighborhood watch, observation).
33
Q
A