Flashcards 1-46
Two foundational design principles?
-the four D’s
-layered s___ (d___ in d____)
Deter, detect, delay, deny;
Security….defense in depth
The point where the delay time remaining exceeds the response force time is called?
The Critical detection point
Area security is….?
Significant perimeter protection and entry is controlled at a single portal.
Point security is….?
When the outer perimeter is loosely controlled and the primary focus is on individual buildings or restricted areas within.
What are some conflicts that might arise in the design process for physical security measures:
-access control measures may conflict-surveillance systems, sensors, door systems;
-safety and security objectives may differ;
-Security goals may not align with an organization’s mission or culture.
Balanced protection is…?
-A concept in the se____de___ pr____ where all aspects - el___st____hu____and pr____of a security system complement and work with each other.
Security design process;
Electronic, structural, human and procedural
A key factor in the nature of the physical security design & strategy employed to meet protection objectives?
The type or use of the facility or asset being protected.
Two types of design criteria are:
Pe_________criteria
Fe_________criteria
Performance criteria - elements chosen for their contribution to performance;
Feature criteria - elements chosen because certain features are required.
Performance criteria is…?
A design process that selects elements & Procedures according to the contribution they make to overall system performance.
Feature Criteria is….?
A design process that selects elements or procedures to satisfy requirements that certain items be present
Five aspects that must be considered when developing security system procedures?
People;
Operations;
Maintenance;
Training & awareness; and
Incident-based and Exploratory investigations;
The 9 basic factors to know from the onset in security design?
Governing codes & regulations;
-Protection requirements;
-Company Standards & guidelines;
-type of construction;
-site layout;
-Material selection;
-utilities;
-life safety and infrastructure
An equation used for calculating risk when developing a design?
Risk = vulnerability x threat x asset value
According to FEMA, the two basic classifications of threats or hazards are….?
Natural and human caused
What is the design basis threat (DBT)?
- A profile of the security engineering and operations of a facility based on the type, composition, capabilities and methods (tactics, techniques & procedures) as well as the goals, intent & motivation of an adversary.
What is a requirements document:
-ID’s the reasons for a new or an upgraded system;
-closely tied to a risk assessment by identifying specific security measures to mitigate threats and reduce vulnerabilities.
The planning process =
-the collection, review and analysis of data relative to the facility where the system will be implemented.
Two important criteria in developing the objectives for implementing or upgrading the PPS?
The objectives must be clearly stated and they must be SMART.