CPP 2022 Domain 5: Physical Security Flashcards
What is the purpose of a security survey?
Determine and document the current security posture,
Identify deficiencies and excesses in existing security measures,
Compare the current posture with a determination of the appropriate level of security or protection needed,
Recommend improvements in the overall situation.
Source: POA, Physical Security, 3.3.1, pages 37-38
What are three physical security assessment methodologies?
Outside-Inward Methodology,
Inside-Outward Methodology,
Functional Methodology.
Source: POA, Physical Security, 3.3.2, page 39
What are typical areas, items, and issues to consider when conducting a physical security survey?
Barriers,
Doors, windows, and other openings,
Locks, Safes and containers, Signage, Lighting, Alarm and electronic security systems, Security officer services, Vehicle, traffic, and parking controls, Protection of utilities, Visitor management, Package and mail handling.
Source: POA, Physical Security, 3.4.1, pages 43-48
How should areas and items be assessed during a physical security survey?
In terms of appropriateness for the situation, age, operability, maintenance, interoperability, aesthetics, and consistency with the current use of the space.
Source: POA, Physical Security, 3.4.1, page 43
What are four tests that should be conducted as part of a physical security survey?
Shipping and receiving,
Alarms,
Computer/server room security,
General access controls.
Source: POA, Physical Security, 3.4.2, page 48
What are five criteria of good physical security survey reports?
Accuracy,
Clarity,
Conciseness,
Timeliness,
Slant or pitch.
Source: POA, Physical Security, 3.5, pages 48-49
What are the two foundational principles of physical security design?
Four Ds,
Layered security or defense-in-depth.
Source: POA, Physical Security, 5.1, page 78
What are the Four Ds?
Deter,
Detect,
Delay,
Deny.
Source: POA, Physical Security, 5.1, page 78
What is a defense-in-depth approach?
An adversary must avoid or defeat a number of protective devices or features in sequence.
Source: POA, Physical Security, 5.1, page 78
What is the different between point and area security?
Area security features a significant perimeter protection and entry is tightly controlled at a single portal.
Point security features a loosely controlled perimeter and the primary security focus is at the individual buildings.
Source: POA, Physical Security, 5.1.1, page 79
What is CPTED?
CPTED, or crime prevention through environmental design, is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means.
Source: POA, Physical Security, 10.1, pages 211-212
What are the three types of CPTED measures?
Mechanical measures,
Organizational measures,
Natural measures.
Source: POA, Physical Security, 10.1, page 212
What are five examples of CPTED tools?
Natural territorial reinforcement,
Natural surveillance,
Natural access control,
Management and maintenance,
Legitimate activity support.
Source: POA, Physical Security, 10.1, pages 212-214
This CPTED tool is the process of establishing a sense of ownership, responsibility, and accountability in property owners, manager, or occupants to increase vigilance in identifying trespassers.
Natural territorial reinforcement.
Source: POA, Physical Security, 10.1, page 213
This CPTED tool states that increasing visibility by occupants and casual observers increases the detection of trespassers or misconduct at a facility.
Natural surveillance.
Source: POA, Physical Security, 10.1, page 213
The idea of this CPTED tool is to employ both real and symbolic barriers - including doors, fences, and shrubbery - to define and limit access to a building or other space
Natural access control.
Source: POA, Physical Security, 10.1, page 213
This CPTED tool states that for spaces to look well cared for and crime-free, they must be maintained. This tool is also supported by the “broken windows” theory.
Management and maintenance.
Source: POA, Physical Security, 10.1, page 213
This CPTED tool states that some places are difficult to protect by nature of their location or other geographic feature and space may need to be occupied to prevent it.
Legitimate activity support.
Source: POA, Physical Security, 10.1, page 213
What is the capable guardian concept?
The presence of a capable guardian may deter crime by reducing the site’s perceived vulnerability and make it less attractive to offenders.
Source: POA, Physical Security, 10.1.1, page 216
What are the four main strategies of second generation CPTED (the Four Cs)?
Cohesion, Capacity threshold (tipping point),
Community culture,
Connectivity.
Source: POA, Physical Security, 10.1.2, page 217
What lenses are added in third generation CPTED and CPTED 3-D?
Third generation CPTED introduces environmental sustainability and green technology.
CPTED 3-D incorporates designation of a space, its definition in terms of management and identity, and design as it relates to desired function.
Source: POA, Physical Security, 10.1.2, page 217
What are the six tasks of technical security projects?
Risk analysis,
Conceptual (schematic),
Design development,
Construction documents,
Bidding,
Construction.
Source: POA, Physical Security, 14.1, page 481
What are two important outcomes of the initial phases of a design project?
A security basis of design, focusing on the specific project requirements and a conceptual design solution based on those requirements;
A business case to support the project.
Source: POA, Physical Security, 14.2, pages 481-482
The level of protection for a group of assets must meet the protection needs of what?
The most critical asset in the group.
Source: POA, Physical Security, 14.2, page 483
What are nine design criteria?
Codes and standards,
Quality,
Capacity, Performance, Features, Cost, Operations, Culture and image, Monitoring and response.
Source: POA, Physical Security, 14.3.1, pages 485-488
What is the purpose of the design concept?
The design concept incorporates the basis of design; documents the findings, conclusions, and recommendations from any initial surveys, and is the first opportunity to document the project’s design.
Source: POA, Physical Security, 14.3.3, page 489
What is included in the typical construction documents (CD) phase package?
CD drawings,
Specifications,
Bill of quantities,
Refined system budgets,
Contract terms and conditions.
Source: POA, Physical Security, 14.3.4, page 493
System security drawings usually consist of what 5 items?
Plans,
Elevations,
Details,
Risers,
Hardware schedules.
Source: POA, Physical Security, 14.3.6, page 495
What two types of costs should be considered in the estimate?
Capital projects and service projects and recurring costs.
Source: POA, Physical Security, 14.4.2, page 503
What are three types of cost estimates?
Budgetary estimates,
Preliminary design estimates,
Final design estimates.
Source: POA, Physical Security, 14.4.3, pages 504-506
This types of cost estimate is prepared during the initial planning phase and the goal is to arrive at a cost figure that can be used for getting the new security system into the budget cycle.
Budgetary estimate.
Source: POA, Physical Security, 14.4.3, page 504
This type of cost estimate is prepared when the security system is part of a larger construction project and should include a contingency of plus or minus 10%.
Preliminary design estimate.
Source: POA, Physical Security, 14.4.3, page 504