CPP 2012 Domain 5: Physical Security Flashcards
What is the difference between a design process based on performance criteria and one based on feature criteria?
A design process based on performance criteria will select elements and procedures according to the contribution they make to overall system performance.
A feature criteria approach selects elements or procedures to satisfy requirements that certain items are present.
Source: POA: Physical Security, 2.2, page 33
What are the three types of attacks used to defeat an access-controlled entry point?
Deceit, Physical attack, Technical attack.
Source: Facilities Physical Security Measures Guideline, 3.3, page 18
What is CPTED?
CPTED, or crime prevention through environmental design, is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means.
Source: POA: Physical Security, 3.1, page 37
What are the three types of CPTED solutions?
Mechanical measures, Human and organizational measures, Natural measures.
Source: POA: Physical Security, 3.1.1, pages 38-39
What is natural territorial reinforcement?
Natural territorial reinforcement is the process of establishing a sense of ownership, responsibility, and accountability in property owners, managers, or occupants to increase vigilance in identifying trespassers.
Source: POA: Physical Security, 3.1.1, page 39
What is the “broken windows” theory?
The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian (i.e. security presence) is observed.
Source: POA: Physical Security, 3.1.1, page 40
What is Jane Jacobs’ “eyes on the street” theory?
A precursor to defensible space theory, it suggested that residential crime could be reduced by orienting buildings toward the street, clearly distinguishing public and private domains, and placing outdoor spaces near intensively used areas.
Source: POA: Physical Security, 3.1.1, page 42
What is defensible space?
The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment could elicit behavior from residents that would contribute significantly to their safety. It includes real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance.
Source: POA: Physical Security, 3.1.2, pages 42-43
How does situational crime prevention differ from CPTED and defensible space?
Situational crime prevention seeks to reduce crime opportunities in all behavioral contexts, not just in the built environment.
Source: POA: Physical Security, 3.1.4, page 48
What theory underpins situational crime prevention?
Rational choice theory.
Source: POA: Physical Security, 3.1.4, page 48
What are the four approaches to situational crime prevention?
Increase the effort required (e.g. target hardening, access control),Increase the risk of being caught (e.g. entry screening, surveillance),Reduce anticipated rewards (e.g. target removal, property labeling),Remove excuses (e.g. deploy signage stimulating the conscience, rule setting).
Source: POA: Physical Security, 3.1.4, pages 48-49
What is the preferred glass type for mitigating blast forces?
Laminated glass is preferred for mitigating blast forces.
Source: Facilities Physical Security Measures Guideline, 3.2.1.3.4, p. 15
What are the four main strategies of second generation CPTED (the four Cs)?
Cohesion,Capacity threshold (tipping point),Community culture,Connectivity.
Source: POA: Physical Security, 3.1.4, pages 51-52
When should security risks be addressed in architectural planning?
During the programming phase of design, when the owner describes the purpose and occupants of the building to the architect.
Source: POA: Physical Security, 3.2.1, page 55
What are the three challenges that security design poses for architects?
Determining requirements,Knowing the technology,Understanding architectural limitations.
Source: POA: Physical Security, 3.2.1, page 56
Who may edit officers’ incident entries in a database log?
Higher-level supervisors.
Source: POA: Security Officer Operations, 2.7.2, page 39
How should changes or corrections be made in officers’ written log entries?
Under a new event number as a separate item.
Source: POA: Security Officer Operations, 2.7.3, page 40
At what size and how far above the ground should an opening in a building’s shell be protected?
Reinforce or secure any openings in the building shell that measure more than 96 square inches (619 square centimeters) and are lower than 18 feet (5.5 meters) above the ground.
Source: POA: Physical Security, 3.2.3, page 66
Who should populate the command center at a special event?
Hosting organization, Facility management, Law enforcement, Security, Fire marshal, Medical director, Sponsors, Promoters, Transportation/parking, Accommodations
Source: POA: Applications, 3.4, pages 99-100
What shape columns should be used in new parking facilities?
Round columns, because they allow for greater visibility than square or rectangular columns.
Source: POA: Applications, 3.2.4, page 69
Where should stairwells and elevators be ideally located in parking facilities?
In the center, visible from wherever the attendant is posted.
Source: POA: Physical Security, 3.2.4, page 69
What kind of gates can be used for driveways where an overhead track would be in the way?
Cantilever slide gates.
Source: Facilities Physical Security Measures Guideline, 3.2.1.3.1, p. 14
How many subjects should a single post order cover?
One.
Source: POA: Security Officer Operations, 2.5, page 34
When should a supervisor visit a security post?
Regularly, in an unscheduled manner.
Source: POA: Security Officer Operations, 2.6, page 37
What two values describe sensor effectiveness?
Probability of detection,Confidence level.
Source: POA: Physical Security, 4.1.1, page 92
When is containment a good strategy?
When theft is the adversary’s goal. Containment involves preventing the adversary from leaving the site with stolen items.
Source: POA: Physical Security, 10.3, page 291
What is “minimum resolvable temperature”?
The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder and the background.
Source: POA: Physical Security, 4.2.2, page 122
What are the five main ways of classifying exterior intrusion sensors?
Passive/active,Covert/visible,Line-of-sight/terrain following,Volumetric/line-detection, Application.
Source: POA: Physical Security, 4.3.1, page 97
To what stimuli do ported coaxial cable sensors respond?
The motion of material with a high dielectric constant or high conductivity. People and metal vehicles are detected.
Source: POA: Physical Security, 4.3.2, page 99
What are the three types of safes for fire protection?
Fire-resistive safes,Insulated filing devices,Containers to protect magnetic media.
Source: POA: Physical Security, 9.4.1, page 277
What is the functional tradeoff when using dual-technology motion sensors?
Lower false alarm rate, but lower detection sensitivity.
Source: Facilities Physical Security Measures Guideline, 3.5.1, p. 26
What do you call the process of testing every alarm point and each automatic function of a new alarm system?
Commissioning.
Source: Facilities Physical Security Measures Guideline, 3.5.3, p. 27
What are the four options for providing security for special events?
Use current security capabilities,Provide security staff with training in special event security,Hire a special event security provider, Provide no security for the event.
Source: POA: Applications, 3.2, page 93
What is the most common type of electromechanical sensor?
A simple mechanical switch, generally used on windows and doors, consisting of a switch unit and a magnetic unit.
Source: POA: Physical Security, 4.4.2, page 118
What is a Hall effect switch?
An electronic switch mounted on a door including a magnet and switch unit that measures magnetic field strength. It provides higher security than balanced magnetic switches.
Source: POA: Physical Security, 4.4.2, page 119
What are the two most common interior motion sensors?
Monostatic microwave,Passive infrared.
Source: POA: Physical Security, 4.4.2, page 120
Where are PIR detectors likely to experience a nuisance alarm?
Passive infrared (PIR) detectors are likely to experience a nuisance alarm when placed near heat sources, such as lights.
Source: POA: Physical Security, 4.4.2, pages 122-123
What is the most common type of wireless sensor?
Radio frequency (RF) sensors.
Source: POA: Physical Security, 4.4.2, page 126
What problems are inherent with radio frequency (RF) sensors?
Collisions,Signal fade, Interference.
Source: POA: Physical Security, 4.4.2, page 126
What is the two-person rule?
The two-person rule requires that two knowledgeable people be involved in a situation or activity to prevent the compromise of facility security by a single insider (e.g. handling critical assets).
Source: POA: Physical Security, 4.4.3, page 128
What are the three reasons to use CCTV in security installations?
View something that is happening,View something that has already happened,Deter unwanted activities.
Source: POA: Physical Security, 5.2, page 135
Who are likely or possible members of a physical protection system (PPS) design team?
CEO, Chief financial officer,HR manager, IT manager, Facilities manager, Project architect, Construction manager, Security systems designer, Security manager.
Source: POA: Physical Security, 12.5, page 334
What are the three main parts of a digital video system?
Camera,Digital electronic signal carrier,PC with viewing or recording software.
Source: POA: Physical Security, 5.4, page 139
What three factors should determine selection of a CCTV camera?
Sensitivity,Resolution,Features.
Source: POA: Physical Security, 5.5, pages 142-147
What four measures can be used to evaluate an immediate response to a security event?
The time it takes for guards to arrive,The probability of communication (from alarm trigger to officer response),Interruption,Neutralization.
Source: POA: Physical Security, 10.4, page 294
What are the six basic application types of exterior security lighting?
Continuous,Glare projection,Standby,Controlled,Portable,Emergency.
Source: Facilities Physical Security Measures Guideline, 3.4.1, page 23
What is the CARVER process?
The CARVER (criticality, accessibility, recuperability, vulnerability, effect, recognizability) process is used to evaluate the attractiveness of a target for attack, from the perspective of the adversary.
Source: POA: Physical Security, 11.3.1, pages 305-306
Field welds and brazing on factory boxes, enclosures, and conduits should be coated with what?
Cold galvanized paint containing at least 95 percent zinc by weight.
Source: POA: Physical Security, 12.9.3, page 356