Chapter 3B Flashcards
Why should operating procedures be tailored to various threat levels?
To ensure the organization’s protection and security strategy meets specific risks.
How can installing systems without developing operating procedures impact risk?
It may actually increase the risk of harm to the organization.
When should operating procedures be considered in a project’s lifecycle?
Operating procedures should be considered during the design phase of a project.
What is Enterprise Risk Management (ERM) designed for in terms of protection strategies?
ERM is designed to integrate crime prevention and antiterrorism as program objectives.
What departments are often included in ERM’s comprehensive protection strategy integration?
Legal, human resources, security, occupational safety, and more.
What does Physical Security Information Management (PSIM) do?
Manages and collects data from different security systems for intelligence-based solutions.
What is the main goal of a metrics program in security?
To determine program effectiveness and facilitate improvements.
Name the main areas evaluated by the Security Metrics Evaluation Tool (Security MET)?
Technical Criteria,
Operational (Security) Criteria, and
Strategic Criteria.
Why is it important to start small when developing a metrics program?
To collect relevant data effectively and efficiently.
What are the key components of the SMART process in metrics development?
Specific, Measurable, Attainable, Repeatable, Time-bounded.
What is Crime Prevention Through Environmental Design (CPTED) based on?
Proper design and use of the environment to reduce crime.
Explain the concept of Defensible Space.
Compartmentalizing the environment into smaller defined areas to enhance security.
What does CPTED stand for?
Crime Prevention Through Environmental Design
Who introduced the concept of CPTED in 1971?
C. Ray Jeffery
What concept is often associated with CPTED that involves compartmentalizing the environment into smaller defined areas?
Defensible Space
According to CPTED, crime prevention relies on an awareness of how people will use spaces for which purposes?
Legitimate and illegitimate purposes
What are the three main areas targeted by CPTED strategies?
Places,
Behaviors, and
Design/Use of Space
What are the three main controls used to support CPTED strategies?
Mechanical Measures,
Organizational Measures,
Natural/Architectural Measures
Name one example of a Mechanical Measure used in CPTED strategies.
Security windows
What do Natural or Architectural Measures in CPTED aim to provide a demarcation between?
Public, semi-public, and private spaces
Give an example of a key aspect of Natural Territorial Support (Territoriality) in CPTED.
Establishing a sense of ownership and vigilance
Which strategy in CPTED aims to improve visibility through the use of windows and lighting?
Natural Surveillance
What are the three main areas that CPTED targets?
Places, Behaviors, Use of Space
What are the three main controls used by CPTED?
Mechanical Measures, Organizational Measures, Natural/Architectural Measures
List six CPTED strategies.
Territoriality,
Natural Surveillance,
Natural Access Control,
Management and Maintenance,
Legitimate Activity Support, and
Compartmentalization
Which locations have higher victimization rates according to CPTED?
Corner locations and ground floor apartments
What does Situational Crime Prevention focus on?
R O to commit crime in B C
Reducing opportunity to commit crime in behavioral concepts
Name the four components of Second Generation CPTED.
Cohesion, Capacity Threshold, Community culture, Connectivity
What are the three areas covered in CPTED 3D?
Designation of space,
Definition in terms of management and identity,
Design of desired function and behaviors
What are the three levels of security defense planning?
SA,
Ex of B,
In S
Site analysis, Exterior of Building, Interior Space
How many security zones are used to establish appropriate standoff and protection layers?
Three: Perimeter, Non-exclusive Zone, Exclusive Zone
What must be done to prevent progressive collapse in buildings three stories or taller?
The building structure must be designed appropriately
What six processes comprise the building design process?
P
S D
D D
C D
B for C
S of C
Programming,
Schematic Design,
Design Development,
Construction Documents,
Bids for construction
Selection of contractor
Where should high security areas be placed in a building?
Middle layers
How can protection against an explosive threat be achieved?
Throught SD and SH
Through standoff distance and structural hardening
What is referred to as threat vectors in security?
Pairing of assets against known vulnerabilities
What approach is needed to protect organization assets effectively?
A systems approach
What three things are integrated in an integrated system in terms of security?
AA
OA and
SS
Architectural aspects,
Operational aspects
Security systems
What is the focus of Enterprise Risk Management (ERM)?
Developing protection strategies through a multi-disciplinary approach
What does Physical Security Information Management (PSIM) do?
Manages and collects data from different security systems
What three things does the Security Metrics Evaluation Tool (Security MET) evaluate?
Technical Criteria,
Operational (Security) Criteria, and
Strategic Criteria
What should be the characteristics of all metrics according to SMART process?
Specific, Measurable, Attainable/Achievable, Repeatable, Time-bounded
What is the recommended height limit for earth berms in landscaping?
Earth berms should not exceed 2.5 feet in height (0.7m).
How far back should low growth shrubs and plants be planted from sidewalks?
Low growth shrubs and plants should be planted 1 yard (1m) back from sidewalks.
Why is it advised to use spiny or thorny shrubs in certain areas of landscaping?
Spiny or thorny shrubs deter potential concealment or easy access to areas.
What height should tree canopies be trimmed up to for natural surveillance?
Tree canopies should be trimmed up to 8 feet (2.4m) high.
What ratio of light-to-dark is recommended for security applications in lighting?
4:1 to 6:1 light-to-dark ratio is recommended for security lighting.
Define Natural Access Control in CPTED principles.
Uses physical or symbolic barriers to direct movement of people and vehicles.
How can plants contribute to Natural Access Control?
“Carissa’s emerald blanket covered the boxwood blanket
Plants like carissa, emerald blanket, and boxwood blanket can form natural barriers.
Explain the ‘broken windows’ theory in relation to crime prevention.
The theory suggests that quickly repairing damages like broken windows can reduce crime.
How can legitimate activity support help in reducing criminal acts?
Having legitimate users in a space for its intended purpose can deter crime.
What is Compartmentalization in the context of CPTED principles?
Compartmentalization involves dividing the environment into clearly defined smaller areas or zones.
How does Crime Prevention through Environmental Design (CPTED) aim to prevent crime?
CPTED aims to proactively prevent crime by integrating security features in design.
Explain Repeat Victimization as a common phenomenon in high-crime areas.
Repeat victimization refers to multiple crimes targeting the same location or individuals.
Define Routine Activity Theory in the context of crime prevention.
Routine Activity Theory states that criminal acts occur in areas encountered during daily routines.
What does the Capable Guardian Theory propose in crime deterrence?
The theory suggests that the presence of a capable guardian can deter crime.
What are the three areas covered in CPTED 3D principles?
D of S_____
D in terms of M and I
Designation of space, and
Definition in terms of management and identity.
What are the three major challenges architects face in relation to security design?
D the R,
K and U T, and
U the A I
Determining the requirements,
knowing and understanding technology, and
understanding the architectural implications.
What are the three levels of security defense planning in building design?
SA
Ex of B
Three types of I S Z
Site analysis,
exterior of building, and
three types of interior space zones.
What are the 6 considerations for graphics and signage according to the notes?
Size of letter, distance, and reflectivity,
lighting, location, and intended party.
How does signage help clarify procedures while avoiding assisting threats?
Signage clarifies procedures without revealing site features that could be targeted.
What is the purpose of a sign in CPTED strategy as per the notes?
A sign conveys a message of appropriate use or acceptable behavior in writing.
What is the role of graphics in CPTED strategy mentioned in the notes?
Graphics convey a message pictorially in CPTED strategy.
How should hazardous material storage areas be positioned in a building?
Away from access points and egress points, considering emergency evacuation.
What design consideration should be made for utilities in a building?
Locate ducts, ventilation, water, gas away from easy access points, protect sources.
What is the purpose of using metal screens in parking areas?
To prevent cars from falling off, enhance security without blocking view entirely.
What is the importance of compartmentalization in building design?
May provide protection from fragments or become fragments during explosion.
How can delay tactics enhance building security?
Serpentine patterns and distant parking slow vehicles, prevent potential threats.
Why should high-security areas be located in the middle layers of a building?
To provide additional layers of protection, making access more difficult.
What 3 methods can be used to protect against an explosive threat?
SD
SH and
C B to reduce Im
Standoff distance and structural hardening, and
creating barriers to reduce impact.
Why is it important to place highly skilled personnel away from hazards?
To ensure their safety by keeping them away from potential danger zones.
What is the role of procedures in designing a facility?
Procedures can be cost-effective in a protection program.
What is the objective of security system design?
To provide a_____p______against threats while balancing c___, s_____ and structural integrity.
To provide adequate protection against threats while balancing cost, safety, and structural integrity.
How does a systems approach help protect organization assets?
Integrates formerly unrelated systems into one seamless protection system.
What is the benefit of a systems approach in security?
Acts as a force multiplier and enhances equipment, people, and processes.
How should integrated systems maintenance responsibility be managed?
It is best to choose a single source for system maintenance to avoid ‘finger-pointing’.
What are the four levels of integration for protection strategies?
PSS
ESS
SP
and
ERM
Physical security, electronic security systems, security program, Enterprise Risk Management.
How should technology complement procedures in security design?
Electronic security systems should complement procedures.
What is the role of the human element in integrated systems?
The human element does not get replaced by technology but acts as a force multiplier.
What is the purpose of Convergence-based systems?
Convergence-based systems interact or communicate with each other automatically.
What does an Enterprise-Integrated security system integrate?
Integrates security systems with other systems controlled centrally across the enterprise.