Chapter 7: Security Architecture Flashcards

1
Q

What is a foundational element of an integrated assets protection strategy?

A

security architecture and design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When is the best time to add security elements into a design?

A

At the beginning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When beginning a new project, what is the first priority to determine?

A

The client’s requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the basic factors to know from the beginning in regards to security design?

A
  1. Governing Codes and Regulations
  2. Protection Requirements
  3. Company Standards and Guidelines
  4. Type of Construction
  5. Site Layout
  6. Material Selection
  7. Utilities
  8. Life Safety
  9. Infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What must a designer consider in regard to codes and regulations?

A
  1. Federal, State, and Local Code Requirements
  2. Trade or Industry Guidelines
  3. Best practices and standards
  4. Permitting Requirements
  5. Contractual Requirements
  6. Standards and Guidelines Established by the client.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the design guidelines for the Department of Defense?

A

The Unified Facilities Criteria (UFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What series of the (UFC) Unified Facilites Criteria pertains to security?

A

Series 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the name of the resource on federal guidelines by agency?

A

Whole Design Guide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Whole Design Guide web address?

A

www.wbdg.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name two organizations that have issued guidelines for commercial use in regards to design criteria.

A

U.S. Federal Emergency Management Agency (FEMA)
The Amercian Society of Civil Engineers (ASCE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the first step to developing a design?

A

conduct a risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the basic assessment approach to risk assessment?

A

Evaluate the asset value, threat, and vulnerability to determine risk to the facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a simple equation for calculating risk?

A

Risk=Vulnerability x Threat x Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What must the client provide since it is not possible to protect against every risk?

A

The necessary level of protection, set acceptable levels of risk, and implement reasonable mitigation measures based on cost versus benefit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the definition of Design Basis Threat?

A

A profile of the type, composition, capabilities and methods, as well as the goals, intent, and motivation of an adversary, upon which the security engineer and operations of a facility are based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are other words for methods?

A

tactics, techniques, and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Under the FEMA model, what are the two basic classifications of threats and hazards?

A

Natural and human caused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some examples of natural hazards?

A

catastrophic weather events, earthquakes, and wildfires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can the probability of a natural event be determined?

A

using historical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are some examples of human-caused hazards?

A

technological hazards and terrorism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the challenge for security designers?

A

The need to maintain public access against ensuring public safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a potential pitfall in choosing security technology?

A

The inability to thoroughly evaluate products’ advertising claims prior to installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Who should be consulted when considering the adoption of new technology?

A

All stake holders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What could be established when considering possible changes to the security system?

A

A change review board.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What should a security designer recognize as a potential?

A

failure points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are some Pros of new construction?

A
  1. Intergrated system and facility
  2. based on own design criteria,
  3. Systems designed for and tested for compatibility
  4. Warrantied Systems
  5. Incorporate future expansion/growth into design.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are some Cons of new construction?

A
  1. Majority of costs are front-loaded
  2. Requires full design of structure and systems
  3. Must procure site
  4. More time required to complete design phase and construction permit requirements.
28
Q

What are the Pros of retrofit construction or renovation?

A
  1. Use existing structure
  2. Installation and minor construction (just the system and components)
  3. Shorter project timeline typically.
29
Q

What are the Cons of retrofit or renovation?

A
  1. Intrusive to current activities.
  2. Capacity of existing utilities and systems may be insufficient.
  3. Cost may exceed new construction
  4. Existing systems may be incompatible or difficult to match.
30
Q

What is the basic premise of design for perimeter security?

A

The four D’s: Deter, Detect, Deny, Delay.

31
Q

What is the easiest option, although not always realistic, to consider when designing for threats?

A

To push the threat as far away as possible from the target.

32
Q

What is the significant limiting factor in urban areas?

A

Space constraints

33
Q

Why are space restraints a significantly limiting factor

A

because it is prohibitively expensive or completely unavailable.

34
Q

What are the drawbacks from selecting a site in a rural area?

A

sacrifice convenience

35
Q

What is a goal of a designed facility?

A

To be less of a target than a neighbor.

36
Q

If an assailant cannot be deterred, what is the next goal?

A

To delay the assailant long enough for an effective response.

37
Q

What can make a facility appear to be an easy target?

A

The appearance of unmaintained equipment, broken cameras, and breached fences.

38
Q

What is one of the first lines of defense of a property?

A

The perimeter of the property.

39
Q

What might perimeter protection include?

A

fence line, security officers, cameras, vehicle barriers, intrusion detection systems, signs, or natural barriers.

40
Q

What is the most common perimeter defense?

A

Fence

41
Q

What does a fence line denote?

A

A line that should not be crossed.

42
Q

What types of intrusion detection systems can be paired with a fence?

A

pressure plates, vibration sensors, laser/LiDAR, and other electronic sensors.

43
Q

Where should the fence line be placed?

A

A short distance from the property line to allow for maintenance and surveillance.

44
Q

How should landscaping be sized on a property?

A

It should reduce in size the closer it gets to the building.

45
Q

What are lighting system designs based on?

A

local code requirements.

46
Q

What is the definition of Incendiary Thermal Effect?

A

a bright flash or fireball at the instant of detonation; unless highly combustible materials are involved, the thermal effect plays an insignificant part.

47
Q

What is the shock or blast wave?

A

the leading edge of the energy wave released by an explosion that rolls out in a circular pattern from the source.

48
Q

What is Reflective Pressure?

A

the energy of the shock wave that is redirected by objects along the initial pathway; reflective pressures have the potential to be much stronger than the initial shock wave at the same distance from the detonation.

49
Q

What is overpressure?

A

the resulting amount of pressure above the ambient values.

50
Q

What is fragmentation?

A

materials encasing or near the explosives, thrown or projected by the pressure waves produced by the explosion.

51
Q

Where should higher security activities be placed in a building?

A

In the middle of the building.

52
Q

Where should lower security activities be placed in a building?

A

the outer layers of the building.

53
Q

Where should highly skilled or other important staff members be placed inside the building?

A

Away from known or potential hazards.

54
Q

Where should windows be placed in a building?

A

Away from potential source of blast.

55
Q

What happens to Annealed Glass do in an explosion?

A

fragments.

56
Q

What is Annealed glass known as ?

A

Standard construction Glass.

57
Q

What happens to large, unsupported windows?

A

fragment easily in a blast.

58
Q

What a blast curtain?

A

A retrofit option that places a curtain, fixed at the ceiling and floor, to catch debri should an explosion occur.

59
Q

What is a catch bar?

A

a bar that is typically placed along the central point of the window which supports the window glazing if it fails so that the glazing folds over the bar rather than entering the room.

60
Q

What is a good practice when designing windows?

A

Reduce the size of the windows whenever possible.

61
Q

What should designers consider when planning for utilities?

A

how the utilities enter the facility, and then protect those areas. Provide a redundant feed in case service is lost. How the service provider accesses the utilities.

62
Q

What should humidity levels be to minimize the chance of mold?

A

less than 60%

63
Q

How do you protect natural air ventilation sources?

A

Through elevation.

64
Q

What does SCADA system stand for?

A

Supervisory Control and Data Acquisition Systems.

65
Q

Who typically uses SCADA systems?

A

building owners or managers.

66
Q

What are SCADA systems used for?

A

Building controls

67
Q

What does it mean for a door to be failsafe?

A

automatic release of locks during an emergency