Flashcards 96 - 139
- The purpose of master keying is….
To provide a hierarchy of access to groups of locks from access to only one lock to increasingly larger groups of locks and to all locks in the population.
- Primary attack avenues of mechanical locks…..
Attack by force
Surreptitious attack
Attack by impression-making and try keys
- Four major components of lighting systems?
Lamp (light bulb)
Luminaire (fixture)
Mounting hardware
Electrical power
- What constitutes lighting operating costs?
Energy…88%
Capital costs…8%
Maintenance….4%
- What lighting considerations must be made for electronic surveillance systems/and or cameras?
CRI-Reflect-Direction
CRI-Reflect-Direction
1. CRI (Color Rendering Index) – Ensures accurate reproduction and identification of colors.
2. Reflectance – The amount of light a material reflects affects brightness and visibility.
3. Directionality – How light is reflected impacts glare, shadows, and distribution.
- Security Architecture and design is……
A discipline that focuses on the design of facilities and buildings so that security features are built in from the start….not later on.
- Perimeter protection may include these 7 things….
Fence line and signs
Security officers and cameras
Vehicle and natural barriers, and
Intrusion detection systems
- Three types of security zones are…..
Perimeter
Non-exclusive zone and
Exclusive
- The zone of security that usually includes entry control and vehicle barriers is…..
Perimeter
- The security zone that usually features less restrictive access and public right of way is…
Non-exclusive zone
- The security zone that usually features controlled entry with highly restrictive access and access control with proximity cards, keypads, passwords or facial recognition CCTV is…..
The Exclusive zone
- What spacing is usually used for signage on boundary fences?
50 feet or 15 meters
- Two categories of barriers?
Passive (fixed) and
Active (operable)
- Active barriers are most often used as……
-vehicle access control points w/in a perimeter barrier system or at the entry to specific buildings within a site to provide a barrier for vehicle screening or inspection.
- How is a barrier rated?
ASTM and the US Dept of State rate barriers according to vehicle weight and speed.
ASTM uses M30, M40, M50
Dept of State uses K4, K8, K12
- What barrier rating stops a 15,000 pound (6,800 Kg) vehicle traveling at 30 mph (48 mph)?
K4……M30
- How does a fail-safe locking mechanism respond during a fire emergency?
It will unlock under any failure condition, such as a loss of power.
- How does a fail-secure locking mechanism respond to a fire emergency?
It remains locked when power is lost or another failure occurs.
- What is 2nd generation CPTED?
It focuses on not only reducing physical opportunities for crime but also creating a sense of neighborliness to help reduce motives that cause crime in the first place.
- Four main strategies of 2nd generation CPTED?
Cohesion
Capacity Threshold
Community culture
Connectivity
- Five most common types of badges?
S, P, W, MS, B
• S → SMART Cards
• P → Proximity
• W → Wiegand Wire
• M → Magnetic Stripe
• B → Barcodes
- How does magnetic stripe encoding work?
Data is encoded in magnetic material on the badge and it gets read as the strip is moved through or inserted into a magnetic reader.
- What are the 3 ways proximity badges are classified?
P - O - W
-By the method of powering the badge
-by the operating frequency range of the badge and by
-whether the badge is read only or has read w/write capability.
- Six types of electrified locking mechanisms include?
EL
EL
ES
ED
DE/ED
EML
• EL - Electric Latch
• EL - Electric Lockset
• ES – Electric Strike
• ED - Electric Deadbolt
• DE/ED – Delayed Egress / Exit Device
• EML – Electromagnetic Lock
- How does a biometric lock function?
By verifying a person’s specific physical characteristics; if verified, the device permits access
- Two error types in biometric technologies?
Type 1….False rejection - an authorized person is improperly rejected.
Type 2…False acceptance - an unauthorized person is improperly accepted
- Two methods that can be used to detect metal?
- Cats Watch Danger, 2. Panthers Fear Danger.”
- Cats Watch Danger, 2. Panthers Fear Danger.”
• Cats (Continuous)
• Watch (Wave)
• Danger (Detectors)
• Panthers (Pulsed)
• Fear (Field)
• Danger (Detectors)
- X-ray approaches - 4 - for package search?
S -M - CT - B
Single energy transmission x-ray
Multiple energy x-ray
Computed tomography (CT) scan and
Backscatter x-ray
- Which x-ray can be safely used on people?
Low dose backscatter x-ray
- What 6 methods are used for trace explosives detection?
3-C-MIF
3C-MIF:
• Chemiluminescence
• Colormetric
• Canine Olfaction
• Mass Spectrometry
• Ion Mobility Spectrometry
• Fluorescence
- Two ways biological agent detection differs from chemical detection?
Response time is not as critical b/c most biological agents are not immediately lethal; and
-bio detection unusually involves filtering the air for several hours then analyzing the filter. Chemical detectors work quicker and involves sampling the air at several perimeter locations.
- What is a nuisance alarm?
Any alarm not caused by an intrusion
- Three main characteristics of intrusion sensor performance?
Probability of detection;
Nuisance alarm rate and
Vulnerability to defeat
- The PD depends on…..6 things:
CWISST (pronounced twist)
You can use the mnemonic “C.W.I.S.S.T.” (pronounced “twist”) to remember these six points:
• C – Condition of the equipment
• W – Weather conditions
• I – Installation conditions
• S – Sensor hardware design
• S – Sensitivity adjustment
• T – Targets to be detected
The word “TWIST” can also remind you of adjusting or fine-tuning security systems, which ties into sensitivity adjustment and sensor design.
Condition of the equipment
Weather conditions
Installation conditions
Sensor hardware design
Sensitivity adjustment
Targets to be detected
130.Three ways to defeat a sensor?
Bypass
Adversary path exploitation
Spoof
- Classification of intrusion sensors?
Passive or active
Covert or visible
Line of sign or terrain following (exterior only)
Volumetric or line detection
Application
- The 7 main elements of video surveillance?
C, L, M, R, S, F, TM
C→ Camera
• L→ Lens
• M→ Monitor
• R→ Recording equipment
• S→ Scene
• F→ Field of view
• T→ Transmission medium
- Four uses of video surveillance?
Visual information about:
Something that is or has happened
-deter or discourage undesirable activities &
-to use video analytics tools.
- Theoretical identification views of a video surveillance system?
Identification of:
Subject
Action
Scene
- Typical parts - 4 - of a video surveillance system (VSS)?
C - R - T - P over E NS
• Camera
• Recording equipment
• Transmission method
• Power over Ethernet network switch
- Five main types of camera lenses:
Wide angle
Standard
Tele-photo
Zoom
Varifocal
- When should the object occupy at least 10% of the scene’s width?
Subject identification
- Five basic tasks of PPS implementation?
P- A - D - S - I
-P.A.D.S.I.
1. P – Planning & Assessment: Identify security requirements and assess vulnerabilities.
2. A – Architect Solutions: Develop conceptual solutions to address security gaps.
3. D – Design & Documentation: Prepare the PPS design and construction documents.
4. S – Solicit & Select: Request bids, negotiate pricing, and finalize vendor selection.
5. I – Implement & Inspect: Install, test, and commission the security system.
- Six elements of the typical integrated PPS project?
C - D - B
I - A - W
C → Project Concept
D → Project Design
B → Managing the Bid Process
I → Managing the Implementation Process
A → Acceptance of Work
W → Initializing & Managing the Warranty Process