Flashcards 1-46

1
Q

Two foundational design principles?

-the four D’s

-layered s___ (d___ in d____)

A

Deter, detect, delay, deny;

Security….defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The point where the delay time remaining exceeds the response force time is called?

A

The Critical detection point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Area security is….?

A

Significant perimeter protection and entry is controlled at a single portal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Point security is….?

A

When the outer perimeter is loosely controlled and the primary focus is on individual buildings or restricted areas within.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 3 conflicts that might arise in the design process for physical security measures:

TC - SS - CC

A
  1. Tech Conflicts – Access control measures (like surveillance, sensors, and doors) can interfere with each other.
    1. Safety vs. Security – Safety and security objectives don’t always align (e.g., a locked door enhances security but may hinder emergency exits).
    2. Culture Clash – Security goals might not fit an organization’s mission or culture (e.g., strict security may feel restrictive in an open, collaborative workplace).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Balanced protection is…?

-A concept in the se____de___ pr____ where all aspects - el___st____hu____and pr____of a security system complement and work with each other.

A

Security design process;

Electronic, structural, human and procedural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A key factor in the nature of the physical security design & strategy employed to meet protection objectives?

A

The type or use of the facility or asset being protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Two types of design criteria are:

Pe_________criteria

Fe_________criteria

A

Performance criteria - elements chosen for their contribution to performance;

Feature criteria - elements chosen because certain features are required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Performance criteria is…?

A

A design process that selects elements & Procedures according to the contribution they make to overall system performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Feature Criteria is….?

A

A design process that selects elements or procedures to satisfy requirements that certain items be present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Five aspects that must be considered when developing security system procedures?

Proper Operations Maintain Training & Investigations

A

Proper → People
• Operations → Operations
• Maintain → Maintenance
• Training → Training & Awareness
• Investigations → Incident-based & Exploratory Investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The 9 basic factors to know from the onset in security design?

“GC&R, PR, CS&G,
T of C, SL, MS,
U, LS and I

A

• Great → Governing codes & regulations
• People → Protection requirements
• Create → Company Standards & guidelines
• The → Type of construction
• Smartest → Site layout
• Measures → Material selection
• Using → Utilities
• Logical → Life safety
• Insights → Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An equation used for calculating risk when developing a design?

A

Risk = vulnerability x threat x asset value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

According to FEMA, the two basic classifications of threats or hazards are….?

A

Natural and human caused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the design basis threat (DBT)?

A profile of the SE&O of a facility based on the TCCM-(T-T&P) as well as the GIM of an adversary

A

A profile of the security engineering and operations of a facility based on the type, composition, capabilities and methods (tactics, techniques & procedures) as well as the goals, intent & motivation of an adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a requirements document:

A

-ID’s the reasons for a new or an upgraded system;
-closely tied to a risk assessment by identifying specific security measures to mitigate threats and reduce vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The planning process is the c____, r______ and a______ of d______ relative to the facility where t_____ S___ w____ be i______.

A

-the collection, review and analysis of data relative to the facility where the system will be implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In developing the objectives for implementing or upgrading the PPS, they should be 1) _______ and 2) _____?

A

The objectives must be clearly stated and they must be SMART.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SMART stands for

A

Specific, measurable and then for

IPPS - aggressive but achievable, realistic and time bounded;

For POA - attainable, repeatable and time dependent

20
Q

Factors - 6 - that weigh in physical security design?

“As
B or FT
Su
Lo
MS
R

A

As→ Assets under protection
B or FT→ Building or facility type
Su → Surroundings
Lo → Location
MS → Management support
R - resources

21
Q

In CPTED security layering, where is the first layer of security?

A

At the Perimeter of the property.

22
Q

In CPTED layering, where is the 2nd layer of security?

A

At the building exterior

23
Q

In CPTED security layering, which layers are inside the building?

A

The 3rd, 4th and 5th layers:
-3 - segragates authorized from unauthorized visitors;
-4-segregates generally accessible client areas from staff only areas;
5-further restricts staff access to highly sensitive areas.

24
Q

What is CPTED?

A

An approach to reducing crime or security incidents through the strategic design of the built environment. It uses organizational, mechanical & natural methods, to control access, enhance natural surveillance and territoriality and support legitimate activity.

25
Q

Three approaches (measures) to CPTED strategies?

A

Mechanical measures

Organizational measures

Natural or architectural measures

26
Q

Natural surveillance is….?

A

A CPTED strategy to increase visibility from in to out and from out to in to increase witness potential
-foster a sense of exposure to criminals;
-give advance visibility to areas people are entering.

27
Q

The broken windows theory?

A

-Leaving broken windows or other decay markers unaddressed leads to the impression of abandonment and increases crime opportunity b/c no capable guardian is observed.

28
Q

Compartmentalization?

A

-A CPTED strategy to design multiple or concentric layers of security measures around highly protected assets; also known as protection in depth

29
Q

The four levels of integration are?

“Every Person Secures Everything”

A

“Every Person Secures Everything”

•	Every → Electronic Security System
•	Person → Physical Security System
•	Secures → Security Programs
•	Everything → Enterprise Risk Management
30
Q

A successful security design integrates 3 primary elements?

A

Architectural aspects;
Security systems; and
Operational factors

31
Q

PSIM is….?

A

Physical Security Information Management

32
Q

In regards to resources, what 3 things does project management involve?

A

Planning, organizing and controlling resources on a project.

33
Q

Four constraints on any project?

A

Scope;
Schedule
Budget and
Quality

34
Q

The 6 typical elements in the project management process for a PPS?

PC, PD, MB, MI, A, MW

A

Project concept
• Designing the project
• Managing the bid process
• Implementation process management
• Acceptance of work
• Warranty process initiation & management

35
Q

What are the two first phases of system design principles?

A

Planning and assessment

36
Q

The six typical tasks of a technical security project?

Real cats don’t chase big critters “

A

Real Cats Don’t Chase Big Critters.”
• Real → Risk Analysis
• Cats → Conceptual (Schematic) Design
• Don’t → Design Development
• Chase → Construction Documents
• Big → Bidding
• Critters → Construction

37
Q

What term describes the outcome of the overall planning phase through a set of security requirements or objectives that is used as the basis of the eventual design?

A

Design basis

38
Q

The ground rules and guidelines for the design are:

A

The design criteria

39
Q

The two phases in design and documentation?

The DD P and the CD P

A

DD - The design development phase

&

CD - The construction documents phase

40
Q

The three sections of the procurement documents - also known as contract (or bid) documents:

CD - CS - CD

A

Contractual details;
Construction specifications and
Construction drawings

41
Q

What 5 items are part of the construction document (CD) phase package?

Can smart builders really construct?

A

Can Smart Builders Really Construct?”
• C – CD Drawings
• S – Specifications
• B – Bill of Quantities
• R – Refined System Budgets
• C – Contract Terms and Conditions

42
Q

The results of detailed specifications are:

1)

2)

A

-1.) all bidders get the same complete understanding of requirements and

2.) final implementation reflects what was intended.

43
Q

CADD stands for…..?

A

Computer-aided design drafting

44
Q

The table of related security devices is called….?

A

The Hardware Schedule

45
Q

Three types of cost estimates are:

A

Budgetary estimates

Preliminary design estimates and

Final design estimates

46
Q

The two possible designers of the system are:

A

Customer or end user;

Contractor or integrator