CPTED, Design, and Metrics Flashcards

1
Q

Key Points 1

A

Crime Prevention Through Environmental Design (CPTED) is a set of concepts based upon the idea that the proper design and use of the environment can reduce the fear, opportunity, and incidence of crime and improve our quality of life (C. Ray Jeffery, 1971).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Points 2

A

Defensible Space is where the environment is compartmentalized (divided) into smaller areas or into zones that are clearly defined, which makes them easier to protect. (Oscar Newman, 1972).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key Points 3

A

CPTED targets three main areas: 1) places, 2) behaviors, and 3) use of space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key Points 4

A

CPTED uses three main controls: 1) mechanical measures, 2) organizational measures, and 3) natural/architectural measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Points 5

A

CPTED Strategies: Territoriality, Natural Surveillance, Natural Access Control, Management and Maintenance, Legitimate Activity Support, and Compartmentalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key Points 6

A

Corner locations and ground floor apartments have higher victimization rates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key Points 7

A

Situational Crime Prevention - Focuses on reducing opportunity to commit crime in all behavioral concepts. It addresses both motives and opportunity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key Points 8

A

Second Generation CPTED - There are four components: 1) cohesion, 2) capacity threshold, 3) community culture, and 4) connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key Points 9

A

CPTED 3D - There are three areas: 1) designation of space, 2) definition in terms of management and identity, 3) design of desired function and behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key Points 10

A

There are 1) architectural, 2) systems, and 3) procedural considerations when it comes to graphics and signage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key Points 11

A

There are three levels of security defense planning: 1) site analysis, 2) exterior of building, and 3) interior space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key Points 12

A

he building design process comprises of the following:
Programming
Schematic design
Design development
Construction documents (drawings)
Bids for construction/selection of contractor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key Points 13

A

A compound that allows for non-employee access (visitors, etc.) should locate the public access building towards the front of the site, while the more secure buildings should be located towards the back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key Points 14

A

High security areas should be placed in the middle layers of the building while lower security areas can be placed on the outer layers of the building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key Points 15

A

Standoff distance and structural hardening are two ways to protect against an explosive threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key Points 16

A

Security zones may be used to establish appropriate standoff and protections layers: 1) perimeter, 2) non-exclusive zone and 3) exclusive zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Key Points 17

A

Serpentine patterns may be a cost-effective way to protect from a speeding vehicle when installed in front of retractable bollards or other active vehicle barriers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Key Points 18

A

The building structure must also be designed to prevent progressive collapse for buildings that are three or more stories tall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Key Points 19

A

The pairing of assets against known vulnerabilities, which is often referred to as threat vectors.

20
Q

Key Points 20

A

It takes a “systems approach” to effectively protect organization assets.

21
Q

Key Points 21

A

An integrated system integrates the following into one seamless system: 1) architectural aspects (most significant factor in design), 2) security systems, and 3) operational aspects.

22
Q

Key Points 22

A

Enterprise risk management (ERM) uses a multidisciplinary approach in developing protection strategies and is designed to integrate crime prevention and antiterrorism as program objectives.

23
Q

Key Points 23

A

Physical Security Information Management (PSIM). A PSIM manages and collects data from different security systems.

24
Q

Key Points 24

A

The Security Metrics Evaluation Tool (Security MET) evaluates 1) technical criteria, 2) operational (security) criteria, and 3) strategic criteria.

25
Q

Key Points 25

A

All metrics should use the SMART process; 1) specific, 2) measurable, 3) attainable or achievable, 4) repeatable and 5) time-bounded.

26
Q

Mechanical Measures.

A

Using hardware and technology systems such as locks, security windows, fences, key control systems, video surveillance, and target hardening. These measures act as a deterrent and provide physical protection but must not be used alone; other measures should be used in conjunction with mechanical measures.

27
Q

Organizational Measures

A

Using staffing, policies, and activities to encourage observation, reporting, and intervention when appropriate. It includes activities such as educating people and performing routine patrols.

28
Q

Natural or Architectual Measures

A

Designing space (terrain, layout, landscaping, and other non-mechanical objects) so that it is more user friendly to the intended audience but not for potential adversaries. Provides a demarcation between public, semi-public, and private spaces.

29
Q

Natural surveillance

A

Improving visibility by use of clear zones, lighting, windows, and other means that allow users of the area to witness on-going activities and possible detection of criminal acts.

30
Q

Natural access control

A

Physical or symbolic barriers to prevent or discourage access or to direct movement of people and vehicles to specific access points. Spatial definition, circulation patterns, and target hardening measures can all play a part in natural access control. Plants such as the carissa, emerald blanket, and boxwood blanket are thorny and may help to form a natural barrier but may not be acceptable near areas where small children play. Residence applications may use plants such as the pygmy date palm, Jerusalem thorn and cinnecord to discourage criminal activities such as burglary. Natural access control may also employ the use of moats, walls, water, terrain, rocks/stones, berms, and vegetation as part of the strategy. A few areas to consider:

31
Q

Management and maintenance

A

Spaces or buildings that are well maintained usually have a lower incidence of crime. The “broken windows” theory (Wilson and Kelling, 1982) suggests that if a window in a building is broken, it will lead to more vandalism of the building. Therefore, quickly repairing damage and maintaining a building could reduce the number of criminal acts.

32
Q

Legitimate activity support

A

Having legitimate users in the space or building - using it for its intended purpose - may reduce criminal acts in the space or building.

33
Q

Compartmentalization

A

The design of the environment into smaller areas or zones that are clearly defined. This normally consists of multiple layers (protection-in-depth) of security features to protect people and other assets.

34
Q

Natural territorial support (territoriality)

A

Establishing a sense of ownership and vigilance of the space by routine users. May be structural or psychological in composition and could consist of demarcations of colors, texture, surface variations, signage/graphics, and fences/walls. Effective training and awareness programs are the most basic tools of territoriality.

Signage and Graphics should:

Consider architectural design
Be systematic in deployment
Consider procedures

35
Q

Reflective Pressure

A

the energy or shock wave that is redirected by objects along the initial pathway of a detonated explosive; reflective pressure is greater than the initial (incident) shock wave over the same distances.

36
Q

Standoff Distance

A

The distance between the asset and the threat. Typically regarding explosive, vehicle, or ballistic threats.

37
Q

Risk Profile

A

The description or depiction of risk based on situational or influencing factors.

38
Q

Bollard

A

A vehicle barrier, typically in cylindrical form, often made of steel and concrete, placed to prevent vehicles from passing, while allowing pedestrians and bicycles to enter.

39
Q

Threat Vector

A

Any path by which a threat action can be carried out. This may be a physical path, logical path, or a sequence of events. Includes the action, as well as the individual performing the action.

40
Q

Four Levels of Integration

A

Integration of physical security
Electronic security systems integration
Security program integration
Integration of Enterprise Risk Management (ERM)

41
Q

Security Metrics Evaluation Tool (Security MET)

A

Technical Criteria - reliability, validity, generalizability
Operational (Security) Criteria - cost, timeliness, manipulation
Strategic Criteria - ROI, relevance, communication

42
Q

Enterprise Performance Framework

A

Effectiveness
Efficiency
Strategic Improvement

43
Q

PACS Metrics

A
Forced doors
Door held open
Device malfunction
User error
Unauthorized attempt to gain access
Card misread or expired
Communications failure
44
Q

Compliance Metrics

A
Initial assessment
Reoccurring assessment
Low security site - may require reassessment every 5 years
Higher security site - may require reassessment every 3 years
Systems compliance
Configuration
Network communications
Disaster recovery
45
Q

Security Program Metrics

A

Number of security requests
External dependencies responsiveness
Security cost per square foot
Security cost per employee
Security assessments performed
Security system maintenance inspections performed
Accordion. Select each button to expand the content.

Key Points