CPP 2012 Domain 1 Security Principles and Practices Flashcards
What are indirect costs of security?
Harm to reputation, Loss of goodwill, Loss of employees, Harm to employee morale. Source: POA: Physical Security, 1.6, page 16
What members should comprise a vulnerability assessment team?
Security specialist (leader),
Security systems engineer,
Response expert,
Data analyst,
Operations representatives,
Subject matter experts (e.g. locksmiths, technical writers, legal experts).
Source: POA: Physical Security, 1.7.1, page 20
What is the goal of a vulnerability assessment?
To identify physical protection system (PPS) components in the functional areas of detection, delay, and response and to gather data to estimate their performance against particular threats.
Source: POA: Physical Security, 1.7.3, page 22
What are the three primary functions of a physical protection system (PPS)?
Detection,
Delay,
Response.
Source: POA: Physical Security, 1.7.3, page 23
What are the two key measurements for the effectiveness of the detection function of a physical protection system (PPS)?
Probability of sensing adversary action,
Time required for reporting and assessing the alarm.
Source: POA: Physical Security, 1.7.3, page 23
How is the response function of a physical protection system (PPS) measured?
The response function of a PPS is measured by the time between receipt of a communication of adversary action and the interruption of the adversary action.
Source: POA: Physical Security, 1.7.3, page 23
What is the vulnerability assessment team’s primary job as it pertains to a physical protection system (PPS)?
To determine security system effectiveness.
Source: POA: Physical Security, 1..7.3, page 24
What are the two basic analytical approaches to a risk assessment?
Compliance based,
Performance based.
Source: POA: Physical Security, 1.7.4, page 25
What is the formula for residual risk?
R = T x A x V, where R = residual risk, T = threat, A = asset to be protected, V = vulnerability. Source: POA: Physical Security, 1.7.4, page 26
A well-engineered physical protection system (PPS) exhibits which three characteristics?
Protection in depth,
Minimum consequence of component failure (redundancy),
Balanced protection.
Source: POA: Physical Security, 2.1, page 31
What are the three contributors to cost of replacement?
Purchase price or manufacturing cost,
Freight and shipping charges,
Make-ready or preparation cost to install it or make it functional.
Source: POA: Physical Security, 1.6, page 16
What is the formula for lost income cost?
I = i/365 x P x t,
where
I = income earned,
i = annual percent rate of return,
P = principal amount (in dollars) available for investment,
t = time (in days) during which P is available for investment.
Source: POA: Physical Security, 1.6, page 17
What is the cost of loss formula?
K = (Cp + Ct + Cr + Ci) – (I-a), where K = criticality, total cost of loss, Cp = cost of permanent replacement, Ct = cost of temporary substitute, Cr = total related costs, Ci = lost income cost, I = available insurance or indemnity, a = allocable insurance premium amount. Source: POA: Physical Security, 1.6, page 18
What are the elements of a systems approach to developing a physical protection system (PPS)?
Assessment of vulnerability,
Implementation of countermeasures,
Evaluation of effectiveness.
Source: POA: Physical Security, 1.1, page 6
What three questions does a risk assessment attempt to answer?
What can go wrong?
What is the likelihood it would go wrong?
What are the consequences?
Source: POA: Physical Security, 1.2, page 7
What four questions does risk management attempt to answer?
What can be done?
What options are available?
What are the associated tradeoffs in terms of costs, benefits, and risks?
What are the impacts of current management decisions on future options?
Source: POA: Physical Security, 1.2, page 8
What is the design-basis threat?
The adversary against which the utility must be protected. It is used to help design and evaluate a physical protection system (PPS).
Source: POA: Physical Security, 1.3, page 10
What are the three general measures of valuing assets?
Cost,
Consequence criteria,
Policy.
Source: POA: Physical Security, 1.5, page 15
What is the difference between assets protection and security?
Assets protection includes all security functions, as well as related functions such as investigations, risk management, safety, compliance, and emergency management.
Source: POA: Security Management, 4.1.2, page 65
Assets protection is increasingly based on what principle?
Risk management.
Source: POA: Security Management, 4.1.3, page 69
What are the five avenues of addressing risk?
Avoidance, Transfer, Spreading, Reduction, Acceptance. Source: POA: Security Management, 4.2.1, page 70
What are the five Ds of security?
Deter, Deny, Detect, Delay, Destroy. Source: POA: Security Management, 4.2.1, pages 70-71
What four major areas does assets protection cover in the telecommunications sector?
Information security Network/computer security, Fraud prevention, Physical security. Source: POA: Security Management, 4.2.2, page 74
What are the five forces shaping assets protection globally?
Technology and touch,
Globalization in business,
Standards and regulation,
Convergence of security solutions,
Homeland security and the international security environment.
Source: POA: Security Management, 4.3, page 76
According to Davidow and Malone, what is the centerpiece of the new global economy?
The virtual product, where major business functions are outsourced with hardly any internal departmentalization.
Source: POA: Security Management, 4.3.2, page 79
What are the three managerial dimensions of assets protection?
Technical expertise,
Management ability,
Ability to deal with people.
Source: POA: Security Management, Figure 4-6, page 84
What are the two general types of insurance?
Property,
Liability.
Source: POA: Security Management, 4, Appendix A, page 94
What are the three classifications of loss in insurance policies?
Direct loss,
Loss of use,
Extra-expense loss (e.g. cost of defending a liability suit or paying a judgment).
Source: POA: Security Management, 4, Appendix A, page 96
What are the five basic coverages of a crime insurance policy?
Employee dishonesty bond,
Money and securities coverage inside the premises,
Money and securities coverage outside the premises,
Money order and counterfeit paper currency coverage,
Depositors’ forgery coverage.
Source: POA: Security Management, 4, Appendix A, page 99
For insurance against business interruption, what are the two types of valuation methods?
Actual loss sustained,
Valued loss.
Source: POA: Security Management, 4, Appendix A, page 100
In Pastor’s public/private, substitute/supplement model of policing, which cell represents the rarest scenario?
Public/Substitute.
Source: POA: Security Management, 7.1.2, pages 181-182
What three factors are driving the growth of private policing?
Economic and operational issues,
(Fear of) crime and violence,
Order maintenance.
Source: POA: Security Management, 7.1.2, page 182.
What is the optimal relationship between police and private security?
Institutionalized coordination and cooperation through structural and contractual relationships.
Source: POA: Security Management, 7.1.3, page 184
What was the purpose of the Hallcrest reports?
To compare the U.S. security industry to public law enforcement quantitatively.
Source: POA: Security Management, 7.1.3, page 185