Flashcards 1-46

1
Q

Two foundational design principles?

-the four D’s

-layered s___ (d___ in d____)

A

Deter, detect, delay, deny;

Security….defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The point where the delay time remaining exceeds the response force time is called?

A

The Critical detection point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Area security is….?

A

Significant perimeter protection and entry is controlled at a single portal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Point security is….?

A

When the outer perimeter is loosely controlled and the primary focus is on individual buildings or restricted areas within.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some conflicts that might arise in the design process for physical security measures:

A

-access control measures may conflict-surveillance systems, sensors, door systems;
-safety and security objectives may differ;
-Security goals may not align with an organization’s mission or culture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Balanced protection is…?

-A concept in the se____de___ pr____ where all aspects - el___st____hu____and pr____of a security system complement and work with each other.

A

Security design process;

Electronic, structural, human and procedural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A key factor in the nature of the physical security design & strategy employed to meet protection objectives?

A

The type or use of the facility or asset being protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Two types of design criteria are:

Pe_________criteria

Fe_________criteria

A

Performance criteria - elements chosen for their contribution to performance;

Feature criteria - elements chosen because certain features are required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Performance criteria is…?

A

A design process that selects elements & Procedures according to the contribution they make to overall system performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Feature Criteria is….?

A

A design process that selects elements or procedures to satisfy requirements that certain items be present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Five aspects that must be considered when developing security system procedures?

A

People;
Operations;
Maintenance;
Training & awareness; and
Incident-based and Exploratory investigations;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The 9 basic factors to know from the onset in security design?

A

Governing codes & regulations;
-Protection requirements;
-Company Standards & guidelines;
-type of construction;
-site layout;
-Material selection;
-utilities;
-life safety and infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An equation used for calculating risk when developing a design?

A

Risk = vulnerability x threat x asset value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

According to FEMA, the two basic classifications of threats or hazards are….?

A

Natural and human caused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the design basis threat (DBT)?

A
  • A profile of the security engineering and operations of a facility based on the type, composition, capabilities and methods (tactics, techniques & procedures) as well as the goals, intent & motivation of an adversary.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a requirements document:

A

-ID’s the reasons for a new or an upgraded system;
-closely tied to a risk assessment by identifying specific security measures to mitigate threats and reduce vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The planning process =

A

-the collection, review and analysis of data relative to the facility where the system will be implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Two important criteria in developing the objectives for implementing or upgrading the PPS?

A

The objectives must be clearly stated and they must be SMART.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SMART stands for

A

Specific, measurable and then for

IPPS - aggressive but achievable, realistic and time bounded;

For POA - attainable, repeatable and time dependent

20
Q

Factors that weigh in physical security design?

A

Assets under protection
Building or facility type
Surroundings
Location
And other concerns like management support and resources….

21
Q

In CPTED security layering, where is the first layer of security?

At the P_______ of the property.

A

Perimeter

22
Q

In CPTED layering, where is the 2nd layer of security?

At the bl_______ex_______

A

Building exterior

23
Q

In CPTED security layering, which layers are inside the building?

A

The 3rd, 4th and 5th layers:
-3 - segragates authorized from unauthorized visitors;
-4-segregates generally accessible client areas from staff only areas;
5-further restricts staff access to highly sensitive areas.

24
Q

What is CPTED?

A

An approach to reducing crime or security incidents through the strategic design of the built environment. It uses organizational, mechanical & natural methods, to control access, enhance natural surveillance and territoriality and support legitimate activity.

25
Q

Three approaches to CPTED strategies?

A

Natural or architectural measures

Mechanical measures

Organizational measures

26
Q

Natural surveillance is….?

A

A CPTED strategy to increase visibility from in to out and from out to in to increase witness potential
-foster a sense of exposure to criminals;
-give advance visibility to areas people are entering.

27
Q

The broken windows theory?

A

-Leaving broken windows or other decay markers unaddressed leads to the impression of abandonment and increases crime opportunity b/c no capable guardian is observed.

28
Q

Compartmentalization?

A

-A CPTED strategy to design multiple or concentric layers of security measures around highly protected assets; also known as protection in depth

29
Q

The four levels of integration are?

A

An integrated electronic security system;
An integrated physical security system;
Integrated Security programs and
Integration in Enterprise risk management.

30
Q

A successful security design integrates 3 primary elements?

A

Architectural aspects;
Security systems; and
Operational factors

31
Q

PSIM is….?

A

Physical Security Information Management

32
Q

Project Management involves…:

Pl____, Or______ and co____ resources on a project

A

Planning, organizing and controlling…..

33
Q

Four constraints on any project?

Sc_____;
Sc_____;
Bu_____; and
Qu_____

A

Scope;
Schedule
Budget and
Quality

34
Q

Typical elements in the project management process for a PPS?

-Pr____ Co____;
-De_____ the pr_____
-ma____ the bi____ process;
-ma___ the im_____process;
-ac_____ of work and
-In______ & ma_____ the warranty process.

A

Project concept
Designing the project
Managing the bid
Managing the implementation
Acceptance
Initializing and managing

35
Q

What are the two first phases of system design principles?

Pl______ & As_______

A

Planning and assessment

36
Q

The six typical tasks of a technical security project?

Ri____ An____;
-Co_____ (sc____)
-de_____ de______
-Co______ Do______
-Bi_____ & co_______

A

Risk analysis;
Conceptual (schematic)
Design development
Construction documents
Bidding and construction

37
Q

What term describes the outcome of the overall planning phase through a set of security requirements or objectives that is used as the basis of the eventual design?

De______ ba_______

A

Design basis

38
Q

The ground rules and guidelines for the design are:

The de______ cr______

A

Design criteria

39
Q

The two phases in design and documentation?

de____ de_____ stage & co____ do____

A

Design development stage &

Construction documents

40
Q

The three sections of the procurement documents - also known as contract (or bid) documents:

-co_______ details;
-co_______ specifications; and
-co_______ drawings

A

Contractual details;
Construction
Construction

41
Q

What 5 items are part of the construction document (CD) phase package?

-CD dr_______;
Sp___________
Bi______of qu_________
Re______sys_____ budgets; and
Co____ terms and co________

A

Drawings
Specifications
Bill of quantities
Refined systems
Contract terms and conditions

42
Q

The results of detailed specifications are:

-final implementation reflects what was intended; are
-all bidders get the same complete understanding of requirements

A

Yeah!

43
Q

CADD stands for…..?

A

Computer-aided design drafting

44
Q

The table of related security devices is called….?

Ha_______ Sc_________

A

Hardware Schedule

45
Q

Three types of cost estimates are:

-Bu ______ estimates;
-Pre______ de_______ estimates;
-Fi_______ de________ estimates;

A

Budgetary estimates

Preliminary design and

Final design

46
Q

The two possible designers of the system are:

Cu_____ or en____ user
Co_____ or in ______

A

Customer or end user;

Contractor or integrator