Chapter 7: Security Architecture Flashcards
What is a foundational element of an integrated assets protection strategy?
security architecture and design
When is the best time to add security elements into a design?
At the beginning.
When beginning a new project, what is the first priority to determine?
The client’s requirements.
What are the basic factors to know from the beginning in regards to security design?
- Governing Codes and Regulations
- Protection Requirements
- Company Standards and Guidelines
- Type of Construction
- Site Layout
- Material Selection
- Utilities
- Life Safety
- Infrastructure
What must a designer consider in regard to codes and regulations?
- Federal, State, and Local Code Requirements
- Trade or Industry Guidelines
- Best practices and standards
- Permitting Requirements
- Contractual Requirements
- Standards and Guidelines Established by the client.
What are the design guidelines for the Department of Defense?
The Unified Facilities Criteria (UFC)
What series of the (UFC) Unified Facilites Criteria pertains to security?
Series 4
What is the name of the resource on federal guidelines by agency?
Whole Design Guide
What is the Whole Design Guide web address?
www.wbdg.org
Name two organizations that have issued guidelines for commercial use in regards to design criteria.
U.S. Federal Emergency Management Agency (FEMA)
The Amercian Society of Civil Engineers (ASCE)
What is the first step to developing a design?
conduct a risk assessment
What is the basic assessment approach to risk assessment?
Evaluate the asset value, threat, and vulnerability to determine risk to the facility.
What is a simple equation for calculating risk?
Risk=Vulnerability x Threat x Asset Value
What must the client provide since it is not possible to protect against every risk?
The necessary level of protection, set acceptable levels of risk, and implement reasonable mitigation measures based on cost versus benefit.
What is the definition of Design Basis Threat?
A profile of the type, composition, capabilities and methods, as well as the goals, intent, and motivation of an adversary, upon which the security engineer and operations of a facility are based.
What are other words for methods?
tactics, techniques, and procedures.
Under the FEMA model, what are the two basic classifications of threats and hazards?
Natural and human caused.
What are some examples of natural hazards?
catastrophic weather events, earthquakes, and wildfires.
How can the probability of a natural event be determined?
using historical data.
what are some examples of human-caused hazards?
technological hazards and terrorism.
What is the challenge for security designers?
The need to maintain public access against ensuring public safety.
What is a potential pitfall in choosing security technology?
The inability to thoroughly evaluate products’ advertising claims prior to installation
Who should be consulted when considering the adoption of new technology?
All stake holders.
What could be established when considering possible changes to the security system?
A change review board.
What should a security designer recognize as a potential?
failure points.
What are some Pros of new construction?
- Intergrated system and facility
- based on own design criteria,
- Systems designed for and tested for compatibility
- Warrantied Systems
- Incorporate future expansion/growth into design.