Design and Evaluation of PPS - Mary Lynn Garcia Flashcards
Acceptance Testing
performance of all necessary testing to demonstrate that installed equipment will operate in accordance with design plans and specifications
Access Control
process of managing databases or other records and determining the parameters of authorized entry such as who or what will be granted access, when they may enter and where access will occur
Access Control Measures
hardware and software features, physical controls, operating procedures, administrative, procedures and various combinations of these designed to detect or prevent unauthorized access to classified information, facilities or materials and to enforce utilization of these measures to protect security and property interests
A C & D
Alarm Communication and Display - Refers to an integrated system of people, procedures and equipment that collects alarm data and presents the information in a manner that promotes rapid assessment.
Acknowledge
to indicate the reception of an alarm signal
Activated Delay
any technique that delays and adversary and depends on a sensor to initiate the delay mechanism
Activated Denial
any technique that denies access to a target and depends on a sensor to initiate the denial mechanism
Active
refers to a communication link that carries a continuous signal allowing immediate detection of a break in the link
Active Infrared Sensor
an active intrusion detection sensor that emits infrared light and detects blockage of light
Active Lines
scanning lines in the raster that contain video information
Active Sensor
an intrusion detection sensor that emits a signal from a transmitter and detects changes in or reflections of that signal by means of a receiver- passive sensor
Actual Force
force consisting of a physical act, especially a violent act directed against a robbery victim
Actual Threat
a credible situation or validated information indicating that facility interest are currently or will be at risk
Adversary
a person performing malevolent acts in pursuit of interests harmful to the facility - may be an insider or outsider
Adversary Action
a specific act performed by an adversary
Adversary Action Sequence
a required/ordered series of acts performed by an adversary to achieve their objectives
Adversary Capabilities
attributes of the adversary, such a knowledge, motivation, and access to equipment that compromise a measure of his/her ability
Adversary Class
adversaries are generally classed as insiders or outsiders, depending on whether they are working inside a facility or must start an action sequence from the outside
Adversary Neutralization
the termination but the facility guard force of an attack such that the adversary is captured, killed or forced to flee
Adversary Path
an ordered collection of actions against a target that if completed results in successful theft or sabotage
Adversary Sequence Modeling
using an analytical model to estimate the probability of success of an adversary along a specific path or sets of paths
Adversary Task
a specific act the adversary must perform in order to advance along a path - penetrate a barrier, travel a certain distance etc
AFC
Automatic Frequency Control - (video /CCTV) An AFC circuit is used to maintain an oscillator at a specified frequency
AGC
Automatic Gain Control - (video/CCTV) used to maintain an output signal at a constant level over a limited range of input signal levels
Alarm
a warning from a sensor or sensor system that a sensor has been triggered or activated, usually signalled by light or sound, may indicate a valid, false or nuisance alarm
Alarm Assessment
process of determining an alarm condition status, appraisal of the credibility, reliability, pertinence, accuracy or usefulness of an indicated alarm.
Alarm Priority Scheme
a technique or presentation for dealing with alarms from a combination of sensors in a local order. Alarm presentation sequence based on importance or seriousness of alarm.
Alert
communication that informs all personnel of a facility emergency and of the location of the emergency
Analog signal
a signal that attains an infinite number of different amplitude levels as opposed to one that can attain only a finite number of levels as a function of time.
Angular Field of View
the measure of the the field of view of a lens or surveillance camera lens combination expressed in degrees
Annunciator
an electrically controlled signal board or indicator primarily used for alarm presentation to guard forces
Aperture
The lens opening that determines the amount of light that will pass through the lens and onto the image plane
ASD
Adversary Sequence Diagrams - a graphical display path that an adversary might take to accomplish his/her objective
Assess
to determine the validity and response to an alarm signal
Assessment
the determination of the cause of an alarm and information regarding the threat
Assessment Zone
the volume of space in which assessments are possible
Attack
an attempt by an adversary to defeat the physical protection system and achieve his or her objectives. Tactics include: force, deceit, stealth, used alone or in combination
Authentication Code
a code known only to members of the response force.
Auto-iris Lens
a lens whose aperture is controlled by monitoring the video signal amplitude and automatically adjusting the iris to maintain a constant video amplitude output
Automated Access Control
electronic or electromechanical system used to authorize movement of personnel, vehicles or materials through entrances and exits of secured areas. Auth obtained by personal id info, computer comparison with data against authorized user list, computer activation of unlock mechanism is user has auth access
Background Noise
the total system noise, independent from the presence or absence of a signal. Signal not included as part of the noise
Balanced Line
a video transmission line whose impedance to ground from either side is equal (124ohms)
Bandsplitting (Frequency scrambling)
common analog voice-scrambling technique that involves partitioning of an audio channel into several separate frequency bands that are transposed and interchanged before transmission
Biometric Device
automatic device that can verify an individual’s identity from a biological measurement or feature
Bistatic
an active intrusion detection sensor where transmitter and receiver are not side by side (collocated) in the same unit. They are separated.
Blackmail
extortion by threat
Blinding
reduction of scene information from high light levels entering the lens
Blooming
loss of detail in a video picture due to excessive bright spot displayed on flourescent screen
BMS Balanced Magnetic Switch
an intrusion sensor usually used to indicate a door opening. Switch is activated but the movement of a magnet mounted on the door
Bridging (looping) lnput
a high impedance intermediate termination of a signal line at the input of an amplifier, monitor or video switcher where the signal line must continue on to other equipment. Allows several pieces of equipment to use a common video signal without loss of signal amp
Brightness (luminance)
the attribute of visual perception in which an area appears to reflect or emit light, measured in foot-lamberts
Broadband
wide bandwidth transmission system with a single carrier and multiple information channels. Fiber-optic or RF
Broadband Jamming
simultaneous jamming of many adjacent frequencies by on high power jamming signal
Buffer
a data area shared by hardware devices or program process that operate at different speeds or with different sets of priorities. Buffer is a midpoint holding place. Exists to support the coordination of separate activities as opposed to accelerating the speed of the activity
Buried Line Sensor
a passive intrusion detection sensor that employs a buried transducer to detect seismic or magnetic disturbances
Burned-In Image
an image that persists in a fixed position in the output signal of a camera tube after it has been turned to a diff scene
Bypass
a sensor defeat mode in which an intruder defeats a sensor by avoiding detection
CCD Charge Coupled Device
a semiconductor device that is used as an optical sensor and stores charge and transfers it sequentially to an amplifier and detector
CCTV Closed Circuit Television
a tv system in which the signal distribution is limited or restricted, usually by cable
Classification
the positive assessment that a detected object is human, animal or some other object
Clear-voice
normal radio transmissions that have not been scrambled or encoded
Clear zone
an area within the storage site perimeter and around the boundary of the storage site free of obstacles. Area is designed to facilitate detection and obs of an intruder
Coaxial Cable
a cable consisting of a single conductor surrounded by and insulated from a metallic shield. Used for transmission of video based band
Coercivity
measure of resistance of a magnetic material to changes int he stored info when exposed to a magnetic field.
Collusion
secret agreement between two or more persons for a fraudulent, secret, illegal or malevolent purpose.
Common mode
signals or signal components that are identical in amplitude, duration and time
Communication
the transmitting or interchanging of information including alarm signals to central processing station and transmission of response info to security personnel
Communication System
the equipment and procedures used but he security force for sending and receiving messages
Complementary Sensors
sensors selected for combination because of their capabilities of mutually providing what the other lacks in terms of probability of detection, nuisance alarm rate and vulnerability to defeat
Containment
physical barriers that restrict or control the movement of or access to nuclear material
Continuous Detection
on a protected perimeter, no detection gaps occur in the detection zones of any of the sensor lines included in the perimeter subsystem
Contraband
material such as firearms, explosives, of material not permitted to leave a particular area.
Contrast
the ration of light and dark portions of a video picture
Control track
the area on the tape containing a recording used by servomechanism to control the longitudinal motion of the tape during playback
Covert Sensor
an intrusion detection sensor that is hidden from view, such as buried underground and does not radiate any signal detectable from outside the perimeter
CPU Central Processing Unit
the microprocessor in computers that provides the computing power
Crawl Test
crawling through an intrusion sensor’s expected detection zone to determine if it is working properly
Crossover
the point at which the centre lines of 2 overlapping microwave sensor beams intersect
Cross-talk
undesired transfer of signals between systems
CRT Cathode Ray Tube
a display tube used in tv sets and CCTV monitors
Deadly Force
force that a reasonable person would consider likely to cause death or serious physical injury that could lead to death
Dead spot
gap in communication system coverage, radio coverage
Dead Time
the length of time between 2 successive uses of the line by a particular sensor in a dime-division, multiplexed sensor system
Deceit
attempt to defeat a security system using false id.
Defeat
prevent someone from accomplishing their goal. Bypassing a sensor or system of access
Delay
element of PPS to impede penetration into or exit of protected area
Denial
the effect achieved by safeguards and security systems that impedes or hinders intruder from gaining access to a protected space
Deployment
actions of the protective force from the time communication is received until the force is in position to neutralize the enemy.
Depth of Field
the maximum distance from a CCTV camera lens that 2 objects may be separated in a given lens field of view and still maintain image focus of both objects
Detection
determing that an unauthorized action has ocurred/ocurring. Sensing the action and assessing the alarm. Not complete without assessment
Detection and Assessment
the element of a PSS to discover and verify an unauthorized intrusion attempt
Detection Zone
an area under surveillance by one or more intrusion detection devices from which an alarm is produced when subject to a condition for an alarm
Deterrence
discouraging an adversary from attempting an assault by making assault appear very difficult to accomplish
Digital Encryption
the conversion of the analog voice signal to a digital signal in the system transmitter and the encoding of each bit of the digital data stream
Digital Signal
a radio signal made up of a series of digital pulses produced by one current or voltage value
Distribution Amplifier
a wideband amplifier having a single imput and several outputs for driving multiple signal lines
Diversion
an attack that draws the atention of an enemy from the point of principal operation
Doppler Effect
the change in frequency of sound/electromagnetic energy due to the motion of the object emitting/reflecting sound/electromagnetic
Due Diligence
diligence reasonably from and excercised by a person who seeks to satisfy a legal requirement or obligation. Exercised to escape liability
Duress code
a prearranged word or phrase that covertly indicates they are acting unwillingly
Duress System
a system that can covertly communicate response to a security control center
Dynamic
active comms link that generates a continually changing signal to rpresent the secure condition
EASI - Estimate of Advisory Sequence Interruption
A dynamic analytical computer model
ECD - Electron Capture Detector
A passive explosive vapor detector
Effectiveness Evaluation
an analysis of the capabilty of a physical protection system to defeat an attack
Electric-field Sensor
an active intrusion detection sensor that generates an electric field and senses changes in capacitance caused by an intruder
Element
distinct part of physical protection system
Embezzlement
stealing of $ or property bh employee to whom it has been entrusted
EMI - Electromagnetic Interference
Disturbances of equipment operation caused by electromagnetic fields from outside sources
Encryption
Digital comms - encoding an intelligible binary data stream to prevent unauthorized eavesdropping of radio transmission
End Event
the ultimate objective of an adversary in a sabotage or theft fault tree
Enhancement
change or modification to a system that improves the operation performance
Entry Control
physical equipment and procedures used to verify access authorization and to detect contraband. Part of the physcial protection function or detection
Entry Control Point
entrance to a site or secured area at that access is controlled and egress is allowed