Design and Evaluation of PPS - Mary Lynn Garcia Flashcards
Acceptance Testing
performance of all necessary testing to demonstrate that installed equipment will operate in accordance with design plans and specifications
Access Control
process of managing databases or other records and determining the parameters of authorized entry such as who or what will be granted access, when they may enter and where access will occur
Access Control Measures
hardware and software features, physical controls, operating procedures, administrative, procedures and various combinations of these designed to detect or prevent unauthorized access to classified information, facilities or materials and to enforce utilization of these measures to protect security and property interests
A C & D
Alarm Communication and Display - Refers to an integrated system of people, procedures and equipment that collects alarm data and presents the information in a manner that promotes rapid assessment.
Acknowledge
to indicate the reception of an alarm signal
Activated Delay
any technique that delays and adversary and depends on a sensor to initiate the delay mechanism
Activated Denial
any technique that denies access to a target and depends on a sensor to initiate the denial mechanism
Active
refers to a communication link that carries a continuous signal allowing immediate detection of a break in the link
Active Infrared Sensor
an active intrusion detection sensor that emits infrared light and detects blockage of light
Active Lines
scanning lines in the raster that contain video information
Active Sensor
an intrusion detection sensor that emits a signal from a transmitter and detects changes in or reflections of that signal by means of a receiver- passive sensor
Actual Force
force consisting of a physical act, especially a violent act directed against a robbery victim
Actual Threat
a credible situation or validated information indicating that facility interest are currently or will be at risk
Adversary
a person performing malevolent acts in pursuit of interests harmful to the facility - may be an insider or outsider
Adversary Action
a specific act performed by an adversary
Adversary Action Sequence
a required/ordered series of acts performed by an adversary to achieve their objectives
Adversary Capabilities
attributes of the adversary, such a knowledge, motivation, and access to equipment that compromise a measure of his/her ability
Adversary Class
adversaries are generally classed as insiders or outsiders, depending on whether they are working inside a facility or must start an action sequence from the outside
Adversary Neutralization
the termination but the facility guard force of an attack such that the adversary is captured, killed or forced to flee
Adversary Path
an ordered collection of actions against a target that if completed results in successful theft or sabotage
Adversary Sequence Modeling
using an analytical model to estimate the probability of success of an adversary along a specific path or sets of paths
Adversary Task
a specific act the adversary must perform in order to advance along a path - penetrate a barrier, travel a certain distance etc
AFC
Automatic Frequency Control - (video /CCTV) An AFC circuit is used to maintain an oscillator at a specified frequency
AGC
Automatic Gain Control - (video/CCTV) used to maintain an output signal at a constant level over a limited range of input signal levels
Alarm
a warning from a sensor or sensor system that a sensor has been triggered or activated, usually signalled by light or sound, may indicate a valid, false or nuisance alarm
Alarm Assessment
process of determining an alarm condition status, appraisal of the credibility, reliability, pertinence, accuracy or usefulness of an indicated alarm.
Alarm Priority Scheme
a technique or presentation for dealing with alarms from a combination of sensors in a local order. Alarm presentation sequence based on importance or seriousness of alarm.
Alert
communication that informs all personnel of a facility emergency and of the location of the emergency
Analog signal
a signal that attains an infinite number of different amplitude levels as opposed to one that can attain only a finite number of levels as a function of time.
Angular Field of View
the measure of the the field of view of a lens or surveillance camera lens combination expressed in degrees
Annunciator
an electrically controlled signal board or indicator primarily used for alarm presentation to guard forces
Aperture
The lens opening that determines the amount of light that will pass through the lens and onto the image plane
ASD
Adversary Sequence Diagrams - a graphical display path that an adversary might take to accomplish his/her objective
Assess
to determine the validity and response to an alarm signal
Assessment
the determination of the cause of an alarm and information regarding the threat
Assessment Zone
the volume of space in which assessments are possible
Attack
an attempt by an adversary to defeat the physical protection system and achieve his or her objectives. Tactics include: force, deceit, stealth, used alone or in combination
Authentication Code
a code known only to members of the response force.
Auto-iris Lens
a lens whose aperture is controlled by monitoring the video signal amplitude and automatically adjusting the iris to maintain a constant video amplitude output
Automated Access Control
electronic or electromechanical system used to authorize movement of personnel, vehicles or materials through entrances and exits of secured areas. Auth obtained by personal id info, computer comparison with data against authorized user list, computer activation of unlock mechanism is user has auth access
Background Noise
the total system noise, independent from the presence or absence of a signal. Signal not included as part of the noise
Balanced Line
a video transmission line whose impedance to ground from either side is equal (124ohms)
Bandsplitting (Frequency scrambling)
common analog voice-scrambling technique that involves partitioning of an audio channel into several separate frequency bands that are transposed and interchanged before transmission
Biometric Device
automatic device that can verify an individual’s identity from a biological measurement or feature
Bistatic
an active intrusion detection sensor where transmitter and receiver are not side by side (collocated) in the same unit. They are separated.
Blackmail
extortion by threat
Blinding
reduction of scene information from high light levels entering the lens
Blooming
loss of detail in a video picture due to excessive bright spot displayed on flourescent screen
BMS Balanced Magnetic Switch
an intrusion sensor usually used to indicate a door opening. Switch is activated but the movement of a magnet mounted on the door
Bridging (looping) lnput
a high impedance intermediate termination of a signal line at the input of an amplifier, monitor or video switcher where the signal line must continue on to other equipment. Allows several pieces of equipment to use a common video signal without loss of signal amp
Brightness (luminance)
the attribute of visual perception in which an area appears to reflect or emit light, measured in foot-lamberts
Broadband
wide bandwidth transmission system with a single carrier and multiple information channels. Fiber-optic or RF
Broadband Jamming
simultaneous jamming of many adjacent frequencies by on high power jamming signal
Buffer
a data area shared by hardware devices or program process that operate at different speeds or with different sets of priorities. Buffer is a midpoint holding place. Exists to support the coordination of separate activities as opposed to accelerating the speed of the activity
Buried Line Sensor
a passive intrusion detection sensor that employs a buried transducer to detect seismic or magnetic disturbances
Burned-In Image
an image that persists in a fixed position in the output signal of a camera tube after it has been turned to a diff scene
Bypass
a sensor defeat mode in which an intruder defeats a sensor by avoiding detection
CCD Charge Coupled Device
a semiconductor device that is used as an optical sensor and stores charge and transfers it sequentially to an amplifier and detector
CCTV Closed Circuit Television
a tv system in which the signal distribution is limited or restricted, usually by cable
Classification
the positive assessment that a detected object is human, animal or some other object
Clear-voice
normal radio transmissions that have not been scrambled or encoded
Clear zone
an area within the storage site perimeter and around the boundary of the storage site free of obstacles. Area is designed to facilitate detection and obs of an intruder
Coaxial Cable
a cable consisting of a single conductor surrounded by and insulated from a metallic shield. Used for transmission of video based band
Coercivity
measure of resistance of a magnetic material to changes int he stored info when exposed to a magnetic field.
Collusion
secret agreement between two or more persons for a fraudulent, secret, illegal or malevolent purpose.
Common mode
signals or signal components that are identical in amplitude, duration and time
Communication
the transmitting or interchanging of information including alarm signals to central processing station and transmission of response info to security personnel
Communication System
the equipment and procedures used but he security force for sending and receiving messages
Complementary Sensors
sensors selected for combination because of their capabilities of mutually providing what the other lacks in terms of probability of detection, nuisance alarm rate and vulnerability to defeat
Containment
physical barriers that restrict or control the movement of or access to nuclear material
Continuous Detection
on a protected perimeter, no detection gaps occur in the detection zones of any of the sensor lines included in the perimeter subsystem
Contraband
material such as firearms, explosives, of material not permitted to leave a particular area.
Contrast
the ration of light and dark portions of a video picture
Control track
the area on the tape containing a recording used by servomechanism to control the longitudinal motion of the tape during playback
Covert Sensor
an intrusion detection sensor that is hidden from view, such as buried underground and does not radiate any signal detectable from outside the perimeter
CPU Central Processing Unit
the microprocessor in computers that provides the computing power
Crawl Test
crawling through an intrusion sensor’s expected detection zone to determine if it is working properly
Crossover
the point at which the centre lines of 2 overlapping microwave sensor beams intersect
Cross-talk
undesired transfer of signals between systems
CRT Cathode Ray Tube
a display tube used in tv sets and CCTV monitors
Deadly Force
force that a reasonable person would consider likely to cause death or serious physical injury that could lead to death
Dead spot
gap in communication system coverage, radio coverage
Dead Time
the length of time between 2 successive uses of the line by a particular sensor in a dime-division, multiplexed sensor system
Deceit
attempt to defeat a security system using false id.
Defeat
prevent someone from accomplishing their goal. Bypassing a sensor or system of access
Delay
element of PPS to impede penetration into or exit of protected area
Denial
the effect achieved by safeguards and security systems that impedes or hinders intruder from gaining access to a protected space
Deployment
actions of the protective force from the time communication is received until the force is in position to neutralize the enemy.
Depth of Field
the maximum distance from a CCTV camera lens that 2 objects may be separated in a given lens field of view and still maintain image focus of both objects
Detection
determing that an unauthorized action has ocurred/ocurring. Sensing the action and assessing the alarm. Not complete without assessment
Detection and Assessment
the element of a PSS to discover and verify an unauthorized intrusion attempt
Detection Zone
an area under surveillance by one or more intrusion detection devices from which an alarm is produced when subject to a condition for an alarm
Deterrence
discouraging an adversary from attempting an assault by making assault appear very difficult to accomplish
Digital Encryption
the conversion of the analog voice signal to a digital signal in the system transmitter and the encoding of each bit of the digital data stream
Digital Signal
a radio signal made up of a series of digital pulses produced by one current or voltage value
Distribution Amplifier
a wideband amplifier having a single imput and several outputs for driving multiple signal lines
Diversion
an attack that draws the atention of an enemy from the point of principal operation
Doppler Effect
the change in frequency of sound/electromagnetic energy due to the motion of the object emitting/reflecting sound/electromagnetic
Due Diligence
diligence reasonably from and excercised by a person who seeks to satisfy a legal requirement or obligation. Exercised to escape liability
Duress code
a prearranged word or phrase that covertly indicates they are acting unwillingly
Duress System
a system that can covertly communicate response to a security control center
Dynamic
active comms link that generates a continually changing signal to rpresent the secure condition
EASI - Estimate of Advisory Sequence Interruption
A dynamic analytical computer model
ECD - Electron Capture Detector
A passive explosive vapor detector
Effectiveness Evaluation
an analysis of the capabilty of a physical protection system to defeat an attack
Electric-field Sensor
an active intrusion detection sensor that generates an electric field and senses changes in capacitance caused by an intruder
Element
distinct part of physical protection system
Embezzlement
stealing of $ or property bh employee to whom it has been entrusted
EMI - Electromagnetic Interference
Disturbances of equipment operation caused by electromagnetic fields from outside sources
Encryption
Digital comms - encoding an intelligible binary data stream to prevent unauthorized eavesdropping of radio transmission
End Event
the ultimate objective of an adversary in a sabotage or theft fault tree
Enhancement
change or modification to a system that improves the operation performance
Entry Control
physical equipment and procedures used to verify access authorization and to detect contraband. Part of the physcial protection function or detection
Entry Control Point
entrance to a site or secured area at that access is controlled and egress is allowed
Equalization
the process of correcting for transmission line losses of frequency characteristics of an electronic signal
Equalizer
an electronic device used to compensate for low and high frequency losses through a transmission system
Equalizing Pulses
pulses used to maintain horizontal sync in interlaced scanning that occur at twice the horizontal scan rate
Event
an act against a PPS that an adversary must perform to achieve their objective
Explosive Detector
Detects 1-ion mobility spectrometer, detecting all types of nitrated explosives 2-gas chromatograph-electron capture detector, detects nitrated commercial explosives including TNT
Faciltiy
a plant built or establised to serve a particular purpose
Faciltiy Characterization
describing, listing or drawing the major parts of a faciltiy
Fail-safe
systems that fail to lose power in such a way to protect an asset
Fail soft
the capabiltiy of a PPS to operate in a reduced capacity during a failure of some element in the system
False Alarm
alarm caused by internal equipment malfunction. Nuisance alarm. FAR= False alarm rate
Far Field
the far edge of an assessment or detection zone. Alarm assessment- resolution limited field of view
Feature Criteria Approach
defintion of a PPS in terms of the features or elements it must contain
Field
the video prodduced in one vertical scan of the camera imager or monitor that consists of 262.5 horizontal scan lines. 2 fields needed to form a single video frame
Field Frequency
rat which video fileds are create. 60Xs each second
Field of view
area visible through the lens of an optical instrument
FL FOcal Length
distance from the optical centre of a simple lens to the plane of focus and is indicative of the image size produced
Flare
light reflections from polished or shiny sufaces. Appear as bright areas on the video image
Float-charging (trickle-charging)
continuous slow charging of a storage battery in that the charging rate is just sufficient to compensate for internal losses or nomal discharge
F Number
the ratio of focal length to the clear aperture in a lens, expressed in the form f/1.8
Foot Candle
unit of illuminesance when the foot is taken as a unit of length. The illuminesance on a surface one square foot in area on which there is a uniformly distributed flux of on lumen. Amount of light a candle gives off in a square foot area
Force continum
description of the range of actions responders must use to counter an adversary. Begins with verbal commands and escalates to deadly force if necessary
Format
the size of a useable image in a TV camera or lens
Frame
a single tv picture, made up of 2 interlaced fields
Frame Frequency
the rate at which a complete frame is scanned - 30 frames per seconde
Freeze Frame
to display a single frame of video continuously
F Stop
the lens designaation indicating relative diaphragm opening or aperture diameter
Full band jamming
a jamming signal with a bandwith greater that or equal to the bandwidth of the signal being jammed
Full Duplex mode
refers to a transceiver function that allows receiving and transmitting simultaneously on 2 discreet frequencies
Ghost
a false image displace from the primary image caused by different arrival times of signals
Guards
the on-site faciltiy sercurity personnel. Response function of PPS
Hardening
enhancing a wall or door to make it more difficult to penetrate
Hoax
a false chain
Identification
the positive assessment of a recognized object, person, animal or thing
Illuminance
the density of the luminous flux incident on a surface
IMS Ion Mobility Spectrometer
a time of flight mass spectrometer that measures the mobility of ions at atmospheric pressure, a passive explosives vapor detector
Infrared (IR)
light or energy in that portions othe electromagnetic spectrum having a longer wavelength that visible light
Insider
a person who has knowledge of operations and security system characteristics and position that would endhance the likelihood of successful bypass or defeat of positive measures should that person attempt such a measure
Interlaced scanning
a process of interweaving two separate fields of video infromation to form a single video frame
Isolation zone
restricted access area surrounding a facility that has been cleared of any objects that could conceal vehicles or individuals. Affords unobstructed observation.
Jamming
an adversary’s attempts to prevent comms through physical destruction of comms equip or through transmission of a disruptive radio signal
Jamming Geometry
the geometrical relationship tween the jammer and the radio untis in the system being jammed
Lag
image smearing and resolution loss when motion exists tween camera and scene
Light Level
intensity of incident light measured in foot-candles or lux
Linear Field of View
the measure of the field of view of a lens or camers expressing the width or height of the scene at a specified distance
Line of sight sensor
an IDS that requires a clear LOS in the detection space
Line lock
a condition when the vertical drive - vertical sync in video signal- is the same frequency as the power line
Line Sensor ( Volumetric sensor)
an IDS sensor that exhibits detection along a line
Line supervision
to monitor the integrity of communication lines
Local Comms
comms tween security personnel and law enforcement once at the location of the emergency
Local Threat Assessment
TA of a specific facilty, operation or geographical area
Logic Tree
a graphical representation of how a combination of events can end in a specific result. Describes how an adversary can reach their goal by defeating the PPS
LOS
Line of sight. THe distance a radio signal may be directly transmitted along the surface of the earth
Lossy
a cable that has high attenuation per unit lenght.
Lumen (lm)
the photometric unit of radiant power.
Luminaire
complete lighting unit consisting of a lamp or lamps together with the parts designed to distribute the light
Lux (lx)
the metric unit of luminance equal to 1 lumen indident upon 1m squared. 1 Lux = 0.0929 fc
Magnetic Buried-Line sensor
generates an electric signal when ferromagnetic material passes near the transducer
Magnetometer
a passive device that monitors the earth’s magnetic field and detects changes to that field caused by the presence of ferromagnetic materials
Malevolent Act
an illegal action.
Malevolent action
a deliberate action with intent to harm or destroy installations or people
matching transformer
a passive device used to convert the impedence of a circuit to the impedance of a transmission line
metal Detector
detects the presence of metals
microwave reflector
a planar metallic surface or grid designed for passive reflection of a microwave beam and used for the purpose of directing the beam
microwave sensor
an active intrusion detection sensor that transmits microwave signals and detects changes in the signal caused by a moving object
monochrome signal
a tv signal without color information
monostatic
an active IDS where the transmitter and the receiver are located together, either the same or nearly coincident (bistatic)
nuisance alarm
not caused by an adversary intrusion. Electromagnetic, thermal, acoustic, seismic or wild life reasons.
Offset
the distance on the ground surface, measured from either the transmitter or receiver in the direction of the line of sight, in which an intruder can crawl under the beam of a microwave sensor undetected
Off site
area outside the facilities land boundaries
on site
area with the facilities land boundaries
Outriggers
the angled metal extensions at the top of the fence
outsider
a person who does not have official business with the facility or has not been granted routine access to a area.
overburden
a cover of dirt or rocks above a sensitive area to protect it from attack. access delay
overt
an action that is open and not concealed
P As (Probability of Assignment)
a measure of the speed and accuracy of determining the caouse of an alarm
P AD ( Probability of Assessed Detection)
the product of the probabilty of detection and the probability of assessment
P D (Probabilty of Detection)
the likelihood of detecting an adversary within the zone covered by an IDS
P E (Probability of system Effectiveness)
the product of the probability of interruption and the probability of neutralization
P I (Probability of Interruption)
the cumulative probabiltiy of detection from the start of an adversary path to the point determined by the time available for response (Tg)
P N (Probabiltiy of Neutralization)
the measure of response force effectiveness, given interruption. Neutralization uses the force continuum from verbal commands through deadly force to prevent adversary success.
P s
Probability that an IDS will sense an unathorized action, sometimes also called probabilty of detection
Passive
refers to a comms link that carries a signal only when an alarm occurs
passive Infrared Sensor
a passive IDS that detects different infrared energy over background levels
Passive Sensor
an IDS that produces no signal from a transmitter but simlply detects energy emitted in the proximity of the sensor
Performance Criteria Approach ( Feature Criteria Approach)
specification of a PPS in terms of the performance expected from it
Performance Test
process to be used to determine that the security features of a system are implemented as designed and that they are adequate for the proposed environment.
Perimeter
an isolation zone around a protected area or the boundary between off site and on site
Physical Protection
measures implemented for the protection of assets or facilities against theft, sabotage or malevolent attacks
Physical Security
the use of peope, procedures and equipment to control access to assets or facilities. The measures required for the protection of assets or facilities from espionage, theft, fraud, sabotage by malevolent human adversary
Physical Security Plan
a facility specific document that gives comprehensive description of the measures emplyed for th physcial protection of property, info, equipment, materials or other assets of interests
Point Detector
an intrusion sensor that has a small detection region ususally located close to the sensor
Portal monitor
any electric instrument designed to perform scans of items, people or vehicles at an ingress/egress for detecting weapons, explosives, nuclear material
Ported
cable having closely spaced, small holes or gaps in the shield that allows RF energy to radiate
Protocol
International standard
Quiescent
the state of an active intrusion sensor when there is no movement in the detection zone.
Qualitative
descriptions having to do with quality or worth.
Quantitative
descriptions having to do with numbers and statistics,
Risk
measure of the potential damage to or loss of an asset based on the probability or an undesireable occurrence
Risk Assessment
process of analyzing threats to and vulnerability of a facility, determining the potential for losses and identifying cost-effective corrective measures and residual risk
Roll Test
rolling through an instrusion sensor’s expected detection zone to determine whether or not its functioning
Run test
running through an intrusion sensor’s expected detection zone to determine if it is functioning
SAVI System Analysis of Vulnerabiltiy Intrusion
a dynamic analytical computer model using mutliple adversary paths
Sector
a defined portion of the PDS that may have mutiple sensors and CCTB coverage
Security Communications Network
the procedures and hardware used to carry comms among members of the security force during both normal and emergency operations
Seismic Buried-Line Sensor
a buried line sensor that detects mechanical pressure deformation and vibration transmitted through the ground burial medium to the sensor transducer
Seismic disturbances
mechanical pressure, deformation or vibration transmitted through the ground
Seismic-magnetic Buried-line Sensor
a buried-line sensor that is sensitive to both seismic and magnetic disturbances
Sensitivity Analysis
an examination of how a system responds when one or more of its elements are changed
Sensor
a device that responds to stumulus associated with an unauthorized action
Spoof
to defeat a sensor by allowing target to pass through detection volume without generating an alarm
Spread -spectrum System
a jam-resistant comms system in which the transmitted signal is much wider than the minimum
Stand off attack
an attack on a facility without entering it, missile from off site
Subsystem
a component or group comprising one unit or fulfilling one function of the PPS
Surreptitious
secret or stealthy, especially leavng behind no evidence of penetration or compromise
Synchronization
In a video monitor or image tube, the process of maintaining two or more scanning processes in phase
Sync pulse
a pulse transmitted as part of the composite video signal to control scanning
Tg
guard response time
Tr
Time available for response. The minimum delay along the portion of the adversary path remaing after the point at which the adversary must be detected to allow guard response. R just exceeds Tg
Tamper Alarm
an alarm that is generated when access doors to sensor electronics or site connections are opened or when the sensor detecst a spoofing attempt
Tamper-indicating Circuitry
line supervisory circuitry on data transmission lines and switches used to sense the loss of alarm capability
Tamper-indicating Device
a device that may be used on items such as containers and doors that will indicate containment integrity
Tampering
interference in an unauthorized manner to defeat a security device
Tamper-safing
the act of applying a temper indicating device
Target
the object of an attack. Asset. Can be tangible or intangible
Target Identification
the process of evaluating a faciltiy to determine locations wher an adversary might accomplish objectives
TDM Time Division Multiplexing
an alarm comms system, signals from more that one sensor are transmitted over a common wire at different predetermined times in a time interval scanning cycle
Terrain following sensor
an IDS that detects equally well on flat and irregular terrain. Line of sight
Test pattern
a chart used to evaluate many opertating parameters of a video camera or system.
Threat
an individual/group with the motivation and capability for theft or sabotage of assets or malevolent acts that would result in loss of assets
Threat Analysis
a process in which info about a threat or potential threat is subjected to systematic and thorough exam in order to id significant facts and derive conclusions from
Threat Assessment
a judgement based on available intelligence, law enforcement, open source info of the actual or potential threat to one or more facilities
Throughput
the rate which people pass through an entry control portal, contraband detector
Time Division multiplexing ( time scrambling)
a common analog voice scrambling technique
Timely Detection
the cumulative probability of detecting an adversary while there is still time for the response force to interrupt the adversary
Transducer
a device that receives waves from one medium/transmission system and supplies waves to another
Transient
a sudden high voltage spike in an electrical system caused by arcing or lightning
Triaxal Cable
a double shielded coaxial cable. A center conductor is surrounded by two concentric, independently shielded conductors. the conductors share the same axis
Twinaxial Cable
a coaxial cable having two center twisted conductors
Twisted Pair
a two conductor transmission line seldom used in video systems due to limited distance and bandwidth
Type I Error
in positive personnel identity verification system, rejection of a claimed identity when the id claimed is true. False reject
Type II Error
in a positive personnel identity verification system, acceptance of a claimed identity when the id claimed is false. False accept
UPS (Uninterruptible Power Source)
a battery powered, alternating current source that will maintain power to vital equipment even is site power is lost
Vault
a structure or room whose doors, walls and roof are designed to make penetration difficult
Vault type room
a facility approved room having a combination locked door and protection provided by a facility approved intrusion alarm system activated by any penetration of walls, floor, ceilings or openings within the room
Video Distribution amplifier
a wideband vieo amplifier used for the transmission of a single video signal to multiple video components from individual impedance matched outputs
Visible Sensor
an IDS that is in plain view of an intruder, attached to a fence or mounted on its own support. Covert sensor
Voice Privacy
the encoding of transmissions for the penetration of eavesdropping on radio traffic or receiving deceptive messages. Clear voice
Volume protection
monitoring an entire area to detect entry from any entrance portal, walls, floor or ceiling
Volumetric Sensor
IDS that exhibits detection in a volume of space
Vulnerability
an exploitable capability or an exploitable security weakness or deficiencey at a facility.
Vulnerability Analysis
a method of identifying the weak points of a facility
Vulnerability Assessment
a systematic evaluation process in which qualitative or quantitative techniques are applied to detect vulnerabilities and to arrive at an effectiveness level for a security system to protect specific targets from specific adversaries and their acts
Walk Test
walking through an IDS sensor’s expected detection zone to determine it working properly
Waveform Monitor
an oscilliscope used specifically for measurement and analysis of video signals
X Band
Frequency 5200 - 11,000 MHz
Zone
a specific volume of space.
Zoom Lens
lens with a variable focal length
False Alarm
In intrusion detection. Those alarms caused by the equipment itself. Poor design, component failure
Capacitor
An electronic component consists of 2 conductor plates separated by a dielectric medium
Wiegand.
Coded credential - card with embedded wires with magnetic properties
PPS- Physical Protection System
Complex configuration of detection, delay and response elements that can be analyzed to determine system effectiveness
Integrates people, procedures and equipment for the protection of assets or facilities against theft, sabotage or other malevolent human attacks.
CDP- Critical Detection Point
Point where there is still enough time remaining for the response force to interrupt the adversary
Standard Deviation
Measure of dispersion of a set of related data
Cyber security- availability
Assurance that computer or network is ready for use. Email servers transporting messages
Cyber security- confidentiality
Assurance that data is only accessed by those with proper authorization. Personal credit data, medical records, proprietary info
Cyber security- integrity
assurance that data is as it was conceived or received as it was transmitted
Cyber Protection System
CPS
Authentication
Assuring that a user is whom they claim to be. Proving so by logging on with something only user knows, has, unique to user
Authorization
Determination of the users rights. Ability to read, write or execute files
Nonrepudation
Following authentication the condition that user actions can absolutely be attributed to that user
Light trespass
Light pollution in I intended areas