CPP 2012 Domain 5: Physical Security Flashcards
What is the difference between a design process based on performance criteria and one based on feature criteria?
A design process based on performance criteria will select elements and procedures according to the contribution they make to overall system performance.
A feature criteria approach selects elements or procedures to satisfy requirements that certain items are present.
Source: POA: Physical Security, 2.2, page 33
What are the three types of attacks used to defeat an access-controlled entry point?
Deceit, Physical attack, Technical attack.
Source: Facilities Physical Security Measures Guideline, 3.3, page 18
What is CPTED?
CPTED, or crime prevention through environmental design, is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means.
Source: POA: Physical Security, 3.1, page 37
What are the three types of CPTED solutions?
Mechanical measures, Human and organizational measures, Natural measures.
Source: POA: Physical Security, 3.1.1, pages 38-39
What is natural territorial reinforcement?
Natural territorial reinforcement is the process of establishing a sense of ownership, responsibility, and accountability in property owners, managers, or occupants to increase vigilance in identifying trespassers.
Source: POA: Physical Security, 3.1.1, page 39
What is the “broken windows” theory?
The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian (i.e. security presence) is observed.
Source: POA: Physical Security, 3.1.1, page 40
What is Jane Jacobs’ “eyes on the street” theory?
A precursor to defensible space theory, it suggested that residential crime could be reduced by orienting buildings toward the street, clearly distinguishing public and private domains, and placing outdoor spaces near intensively used areas.
Source: POA: Physical Security, 3.1.1, page 42
What is defensible space?
The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment could elicit behavior from residents that would contribute significantly to their safety. It includes real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance.
Source: POA: Physical Security, 3.1.2, pages 42-43
How does situational crime prevention differ from CPTED and defensible space?
Situational crime prevention seeks to reduce crime opportunities in all behavioral contexts, not just in the built environment.
Source: POA: Physical Security, 3.1.4, page 48
What theory underpins situational crime prevention?
Rational choice theory.
Source: POA: Physical Security, 3.1.4, page 48
What are the four approaches to situational crime prevention?
Increase the effort required (e.g. target hardening, access control),Increase the risk of being caught (e.g. entry screening, surveillance),Reduce anticipated rewards (e.g. target removal, property labeling),Remove excuses (e.g. deploy signage stimulating the conscience, rule setting).
Source: POA: Physical Security, 3.1.4, pages 48-49
What is the preferred glass type for mitigating blast forces?
Laminated glass is preferred for mitigating blast forces.
Source: Facilities Physical Security Measures Guideline, 3.2.1.3.4, p. 15
What are the four main strategies of second generation CPTED (the four Cs)?
Cohesion,Capacity threshold (tipping point),Community culture,Connectivity.
Source: POA: Physical Security, 3.1.4, pages 51-52
When should security risks be addressed in architectural planning?
During the programming phase of design, when the owner describes the purpose and occupants of the building to the architect.
Source: POA: Physical Security, 3.2.1, page 55
What are the three challenges that security design poses for architects?
Determining requirements,Knowing the technology,Understanding architectural limitations.
Source: POA: Physical Security, 3.2.1, page 56
Who may edit officers’ incident entries in a database log?
Higher-level supervisors.
Source: POA: Security Officer Operations, 2.7.2, page 39
How should changes or corrections be made in officers’ written log entries?
Under a new event number as a separate item.
Source: POA: Security Officer Operations, 2.7.3, page 40
At what size and how far above the ground should an opening in a building’s shell be protected?
Reinforce or secure any openings in the building shell that measure more than 96 square inches (619 square centimeters) and are lower than 18 feet (5.5 meters) above the ground.
Source: POA: Physical Security, 3.2.3, page 66
Who should populate the command center at a special event?
Hosting organization, Facility management, Law enforcement, Security, Fire marshal, Medical director, Sponsors, Promoters, Transportation/parking, Accommodations
Source: POA: Applications, 3.4, pages 99-100
What shape columns should be used in new parking facilities?
Round columns, because they allow for greater visibility than square or rectangular columns.
Source: POA: Applications, 3.2.4, page 69
Where should stairwells and elevators be ideally located in parking facilities?
In the center, visible from wherever the attendant is posted.
Source: POA: Physical Security, 3.2.4, page 69
What kind of gates can be used for driveways where an overhead track would be in the way?
Cantilever slide gates.
Source: Facilities Physical Security Measures Guideline, 3.2.1.3.1, p. 14
How many subjects should a single post order cover?
One.
Source: POA: Security Officer Operations, 2.5, page 34
When should a supervisor visit a security post?
Regularly, in an unscheduled manner.
Source: POA: Security Officer Operations, 2.6, page 37