Chapter 3B Flashcards

1
Q

Why should operating procedures be tailored to various threat levels?

A

To ensure the organization’s protection and security strategy meets specific risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can installing systems without developing operating procedures impact risk?

A

It may actually increase the risk of harm to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When should operating procedures be considered in a project’s lifecycle?

A

Operating procedures should be considered during the design phase of a project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Enterprise Risk Management (ERM) designed for in terms of protection strategies?

A

ERM is designed to integrate crime prevention and antiterrorism as program objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What departments are often included in ERM’s comprehensive protection strategy integration?

A

Legal, human resources, security, occupational safety, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Physical Security Information Management (PSIM) do?

A

Manages and collects data from different security systems for intelligence-based solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main goal of a metrics program in security?

A

To determine program effectiveness and facilitate improvements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the main areas evaluated by the Security Metrics Evaluation Tool (Security MET)?

A

Technical Criteria, Operational (Security) Criteria, Strategic Criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is it important to start small when developing a metrics program?

A

To collect relevant data effectively and efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the key components of the SMART process in metrics development?

A

Specific, Measurable, Attainable, Repeatable, Time-bounded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Crime Prevention Through Environmental Design (CPTED) based on?

A

Proper design and use of the environment to reduce crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the concept of Defensible Space.

A

Compartmentalizing the environment into smaller defined areas to enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does CPTED stand for?

A

Crime Prevention Through Environmental Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who introduced the concept of CPTED in 1971?

A

C. Ray Jeffery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What concept is often associated with CPTED that involves compartmentalizing the environment into smaller defined areas?

A

Defensible Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

According to CPTED, crime prevention relies on an awareness of how people will use spaces for which purposes?

A

Legitimate and illegitimate purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three main areas targeted by CPTED strategies?

A

Places, Behaviors, Design/Use of Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the three main controls used to support CPTED strategies?

A

Mechanical Measures, Organizational Measures, Natural or Architectural Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name one example of a Mechanical Measure used in CPTED strategies.

A

Security windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do Natural or Architectural Measures in CPTED aim to provide a demarcation between?

A

Public, semi-public, and private spaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Give an example of a key aspect of Natural Territorial Support (Territoriality) in CPTED.

A

Establishing a sense of ownership and vigilance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which strategy in CPTED aims to improve visibility through the use of windows and lighting?

A

Natural Surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three main areas that CPTED targets?

A

Places, Behaviors, Use of Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the three main controls used by CPTED?

A

Mechanical Measures, Organizational Measures, Natural/Architectural Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

List some CPTED strategies.

A

Territoriality, Natural Surveillance, Natural Access Control, Management and Maintenance, Legitimate Activity Support, Compartmentalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which locations have higher victimization rates according to CPTED?

A

Corner locations and ground floor apartments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does Situational Crime Prevention focus on?

A

Reducing opportunity to commit crime in behavioral concepts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Name the four components of Second Generation CPTED.

A

Cohesion, Capacity Threshold, Community culture, Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the three areas covered in CPTED 3D?

A

Designation of space, Definition in terms of management and identity, Design of desired function and behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the three levels of security defense planning?

A

Site analysis, Exterior of Building, Interior Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How many security zones are used to establish appropriate standoff and protection layers?

A

Three: Perimeter, Non-exclusive Zone, Exclusive Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What must be done to prevent progressive collapse in buildings three stories or taller?

A

The building structure must be designed appropriately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What process comprises the building design process?

A

Programming, Schematic Design, Design Development, Construction Documents, Bids for construction/Selection of contractor

34
Q

Where should high security areas be placed in a building?

A

Middle layers

35
Q

How can protection against an explosive threat be achieved?

A

Through standoff distance and structural hardening

36
Q

What is referred to as threat vectors in security?

A

Pairing of assets against known vulnerabilities

37
Q

What approach is needed to protect organization assets effectively?

A

A systems approach

38
Q

What is integrated in an integrated system in terms of security?

A

Architectural aspects, Security systems, Operational aspects

39
Q

What is the focus of Enterprise Risk Management (ERM)?

A

Developing protection strategies through a multi-disciplinary approach

40
Q

What does Physical Security Information Management (PSIM) do?

A

Manages and collects data from different security systems

41
Q

What does the Security Metrics Evaluation Tool (Security MET) evaluate?

A

Technical Criteria, Operational (Security) Criteria, Strategic Criteria

42
Q

What should be the characteristics of all metrics according to SMART process?

A

Specific, Measurable, Attainable/Achievable, Repeatable, Time-bounded

43
Q

What is the recommended height limit for earth berms in landscaping?

A

Earth berms should not exceed 2.5 feet in height (0.7m).

44
Q

How far back should low growth shrubs and plants be planted from sidewalks?

A

Low growth shrubs and plants should be planted 1 yard (1m) back from sidewalks.

45
Q

Why is it advised to use spiny or thorny shrubs in certain areas of landscaping?

A

Spiny or thorny shrubs deter potential concealment or easy access to areas.

46
Q

What height should tree canopies be trimmed up to for natural surveillance?

A

Tree canopies should be trimmed up to 8 feet (2.4m) high.

47
Q

What ratio of light-to-dark is recommended for security applications in lighting?

A

4:1 to 6:1 light-to-dark ratio is recommended for security lighting.

48
Q

Define Natural Access Control in CPTED principles.

A

Natural Access Control uses physical or symbolic barriers to direct movement of people and vehicles.

49
Q

How can plants contribute to Natural Access Control?

A

Plants like carissa, emerald blanket, and boxwood blanket can form natural barriers.

50
Q

Explain the ‘broken windows’ theory in relation to crime prevention.

A

The theory suggests that quickly repairing damages like broken windows can reduce crime.

51
Q

How can legitimate activity support help in reducing criminal acts?

A

Having legitimate users in a space for its intended purpose can deter crime.

52
Q

What is Compartmentalization in the context of CPTED principles?

A

Compartmentalization involves dividing the environment into clearly defined smaller areas or zones.

53
Q

How does Crime Prevention through Environmental Design (CPTED) aim to prevent crime?

A

CPTED aims to proactively prevent crime by integrating security features in design.

54
Q

Explain Repeat Victimization as a common phenomenon in high-crime areas.

A

Repeat victimization refers to multiple crimes targeting the same location or individuals.

55
Q

Define Routine Activity Theory in the context of crime prevention.

A

Routine Activity Theory states that criminal acts occur in areas encountered during daily routines.

56
Q

What does the Capable Guardian Theory propose in crime deterrence?

A

The theory suggests that the presence of a capable guardian can deter crime.

57
Q

What are the three areas covered in CPTED 3D principles?

A

CPTED 3D covers Designation of space, Definition in terms of management and identity.

58
Q

What are the three major challenges architects face in relation to security design?

A

Determining the requirements, knowing and understanding technology, understanding the architectural implications.

59
Q

What are the three levels of security defense planning in building design?

A

Site analysis, exterior of building, three types of interior space zones.

60
Q

What are the considerations for graphics and signage according to the notes?

A

Size of letter, distance, reflectivity, lighting, location, intended party.

61
Q

How does signage help clarify procedures while avoiding assisting threats?

A

Signage clarifies procedures without revealing site features that could be targeted.

62
Q

What is the purpose of a sign in CPTED strategy as per the notes?

A

A sign conveys a message of appropriate use or acceptable behavior in writing.

63
Q

What is the role of graphics in CPTED strategy mentioned in the notes?

A

Graphics convey a message pictorially in CPTED strategy.

64
Q

How should hazardous material storage areas be positioned in a building?

A

Away from access points and egress points, considering emergency evacuation.

65
Q

What design consideration should be made for utilities in a building?

A

Locate ducts, ventilation, water, gas away from easy access points, protect sources.

66
Q

What is the purpose of using metal screens in parking areas?

A

To prevent cars from falling off, enhance security without blocking view entirely.

67
Q

What is the importance of compartmentalization in building design?

A

May provide protection from fragments or become fragments during explosion.

68
Q

How can delay tactics enhance building security?

A

Serpentine patterns and distant parking slow vehicles, prevent potential threats.

69
Q

Why should high-security areas be located in the middle layers of a building?

A

To provide additional layers of protection, making access more difficult.

70
Q

What methods can be used to protect against an explosive threat?

A

Standoff distance and structural hardening, creating barriers to reduce impact.

71
Q

Why is it important to place highly skilled personnel away from hazards?

A

To ensure their safety by keeping them away from potential danger zones.

72
Q

What is the role of procedures in designing a facility?

A

Procedures can be cost-effective in a protection program.

73
Q

What is the objective of security system design?

A

To provide adequate protection against threats while balancing cost, safety, and structural integrity.

74
Q

How does a systems approach help protect organization assets?

A

Integrates formerly unrelated systems into one seamless protection system.

75
Q

What is the benefit of a systems approach in security?

A

Acts as a force multiplier and enhances equipment, people, and processes.

76
Q

How should integrated systems maintenance responsibility be managed?

A

It is best to choose a single source for system maintenance to avoid ‘finger-pointing’.

77
Q

What are the four levels of integration for protection strategies?

A

Physical security, electronic security systems, security program, Enterprise Risk Management.

78
Q

How should technology complement procedures in security design?

A

Electronic security systems should complement procedures.

79
Q

What is the role of the human element in integrated systems?

A

The human element does not get replaced by technology but acts as a force multiplier.

80
Q

What is the purpose of Convergence-based systems?

A

Convergence-based systems interact or communicate with each other automatically.

81
Q

What does an Enterprise-Integrated security system integrate?

A

Integrates security systems with other systems controlled centrally across the enterprise.