Flashcards 1-46
Two foundational design principles?
-the four D’s
-layered s___ (d___ in d____)
Deter, detect, delay, deny;
Security….defense in depth
The point where the delay time remaining exceeds the response force time is called?
The Critical detection point
Area security is….?
Significant perimeter protection and entry is controlled at a single portal.
Point security is….?
When the outer perimeter is loosely controlled and the primary focus is on individual buildings or restricted areas within.
What are 3 conflicts that might arise in the design process for physical security measures:
TC - SS - CC
- Tech Conflicts – Access control measures (like surveillance, sensors, and doors) can interfere with each other.
- Safety vs. Security – Safety and security objectives don’t always align (e.g., a locked door enhances security but may hinder emergency exits).
- Culture Clash – Security goals might not fit an organization’s mission or culture (e.g., strict security may feel restrictive in an open, collaborative workplace).
Balanced protection is…?
-A concept in the se____de___ pr____ where all aspects - el___st____hu____and pr____of a security system complement and work with each other.
Security design process;
Electronic, structural, human and procedural
A key factor in the nature of the physical security design & strategy employed to meet protection objectives?
The type or use of the facility or asset being protected.
Two types of design criteria are:
Pe_________criteria
Fe_________criteria
Performance criteria - elements chosen for their contribution to performance;
Feature criteria - elements chosen because certain features are required.
Performance criteria is…?
A design process that selects elements & Procedures according to the contribution they make to overall system performance.
Feature Criteria is….?
A design process that selects elements or procedures to satisfy requirements that certain items be present
Five aspects that must be considered when developing security system procedures?
Proper Operations Maintain Training & Investigations
Proper → People
• Operations → Operations
• Maintain → Maintenance
• Training → Training & Awareness
• Investigations → Incident-based & Exploratory Investigations
The 9 basic factors to know from the onset in security design?
“GC&R, PR, CS&G,
T of C, SL, MS,
U, LS and I
• Great → Governing codes & regulations
• People → Protection requirements
• Create → Company Standards & guidelines
• The → Type of construction
• Smartest → Site layout
• Measures → Material selection
• Using → Utilities
• Logical → Life safety
• Insights → Infrastructure
An equation used for calculating risk when developing a design?
Risk = vulnerability x threat x asset value
According to FEMA, the two basic classifications of threats or hazards are….?
Natural and human caused
What is the design basis threat (DBT)?
A profile of the SE&O of a facility based on the TCCM-(T-T&P) as well as the GIM of an adversary
A profile of the security engineering and operations of a facility based on the type, composition, capabilities and methods (tactics, techniques & procedures) as well as the goals, intent & motivation of an adversary.
What is a requirements document:
-ID’s the reasons for a new or an upgraded system;
-closely tied to a risk assessment by identifying specific security measures to mitigate threats and reduce vulnerabilities.
The planning process is the c____, r______ and a______ of d______ relative to the facility where t_____ S___ w____ be i______.
-the collection, review and analysis of data relative to the facility where the system will be implemented.
In developing the objectives for implementing or upgrading the PPS, they should be 1) _______ and 2) _____?
The objectives must be clearly stated and they must be SMART.
SMART stands for
Specific, measurable and then for
IPPS - aggressive but achievable, realistic and time bounded;
For POA - attainable, repeatable and time dependent
Factors - 6 - that weigh in physical security design?
“As
B or FT
Su
Lo
MS
R
As→ Assets under protection
B or FT→ Building or facility type
Su → Surroundings
Lo → Location
MS → Management support
R - resources
In CPTED security layering, where is the first layer of security?
At the Perimeter of the property.
In CPTED layering, where is the 2nd layer of security?
At the building exterior
In CPTED security layering, which layers are inside the building?
The 3rd, 4th and 5th layers:
-3 - segragates authorized from unauthorized visitors;
-4-segregates generally accessible client areas from staff only areas;
5-further restricts staff access to highly sensitive areas.
What is CPTED?
An approach to reducing crime or security incidents through the strategic design of the built environment. It uses organizational, mechanical & natural methods, to control access, enhance natural surveillance and territoriality and support legitimate activity.
Three approaches (measures) to CPTED strategies?
Mechanical measures
Organizational measures
Natural or architectural measures
Natural surveillance is….?
A CPTED strategy to increase visibility from in to out and from out to in to increase witness potential
-foster a sense of exposure to criminals;
-give advance visibility to areas people are entering.
The broken windows theory?
-Leaving broken windows or other decay markers unaddressed leads to the impression of abandonment and increases crime opportunity b/c no capable guardian is observed.
Compartmentalization?
-A CPTED strategy to design multiple or concentric layers of security measures around highly protected assets; also known as protection in depth
The four levels of integration are?
“Every Person Secures Everything”
“Every Person Secures Everything”
• Every → Electronic Security System • Person → Physical Security System • Secures → Security Programs • Everything → Enterprise Risk Management
A successful security design integrates 3 primary elements?
Architectural aspects;
Security systems; and
Operational factors
PSIM is….?
Physical Security Information Management
In regards to resources, what 3 things does project management involve?
Planning, organizing and controlling resources on a project.
Four constraints on any project?
Scope;
Schedule
Budget and
Quality
The 6 typical elements in the project management process for a PPS?
PC, PD, MB, MI, A, MW
Project concept
• Designing the project
• Managing the bid process
• Implementation process management
• Acceptance of work
• Warranty process initiation & management
What are the two first phases of system design principles?
Planning and assessment
The six typical tasks of a technical security project?
Real cats don’t chase big critters “
Real Cats Don’t Chase Big Critters.”
• Real → Risk Analysis
• Cats → Conceptual (Schematic) Design
• Don’t → Design Development
• Chase → Construction Documents
• Big → Bidding
• Critters → Construction
What term describes the outcome of the overall planning phase through a set of security requirements or objectives that is used as the basis of the eventual design?
Design basis
The ground rules and guidelines for the design are:
The design criteria
The two phases in design and documentation?
The DD P and the CD P
DD - The design development phase
&
CD - The construction documents phase
The three sections of the procurement documents - also known as contract (or bid) documents:
CD - CS - CD
Contractual details;
Construction specifications and
Construction drawings
What 5 items are part of the construction document (CD) phase package?
Can smart builders really construct?
Can Smart Builders Really Construct?”
• C – CD Drawings
• S – Specifications
• B – Bill of Quantities
• R – Refined System Budgets
• C – Contract Terms and Conditions
The results of detailed specifications are:
1)
2)
-1.) all bidders get the same complete understanding of requirements and
2.) final implementation reflects what was intended.
CADD stands for…..?
Computer-aided design drafting
The table of related security devices is called….?
The Hardware Schedule
Three types of cost estimates are:
Budgetary estimates
Preliminary design estimates and
Final design estimates
The two possible designers of the system are:
Customer or end user;
Contractor or integrator