Outros Flashcards
Case studies examples?
Crisis management, use of force, and ethics
What are the three ideas which enterprise performance framework is based?
Effectiveness, efficiency, strategic improvement
What are the two phases of the assessment to perform in a facility Security assessment (compliance of facilities)?
Initial assessment, recurring assessment
In a recurring assessment what are the interval determined by the security level of facility?
5y for low security level
3y for high security level
At what height should a barbed wire/razor wire be installed to discourage human trespassing?
7 ft. (2.1 m) not counting the top guard
What are the assembly components in a mechanical lock?
The bolt or latch
The keeper or strike
The tumbler array
The key or unlocking device
What are the primary types of mechanical locks?
Warded
Lever
Pin tumbler
Wafer
Dial combination
What are the most difficult vulnerability to identify and measure?
Inadvertent threats and
Associated vulnerability
What is the promising commercial technology for explosive detection that uses pulsed low-energy radio waves to determine the presence of nitrogen-rich material?
Quadrupole resonance (QR)
How explosive detection technology is divided?
Bulk and Trace methods
Bulk: X-ray, Computed tomography (CT), nuclear, quadrupole resonance
Trace: ion mobility spectrometry, colorimetric, chemiluminescence, mass spectrometry, fluorescence, canine olfaction
Learning can be separated into which domains?
Cognitive (knowledge-based)
Affective (attitudinal or perceptual)
Psychomotor (physical skills)
What are the four states of a door?
Open
Closed
Latched
Locked
What type of mechanical lock provide more security?
Pin tumbler lock
What are the types of biometric technologies?
Eye pattern
Hand or finger geometry
Handwriting
Fingerprints (most reliable)
Voice
Face
Other techniques
At this phase the project team develop all the necessary documentation to support the procurement of the PPS.
Design and estimation
What consists the procurement package or construction document?
Contract information
Bidders’ instructions
System specifications
Statement of work
Drawings
Equipment schedules
What are some sources of risk a project manager should consider as contingency activity?
Construction requirements
Performance expectations
Technology challenges
Changes in priority
Underestimating
Natural and man-made disasters
Lack of coordination w/ other projects
How changes are proposed to the project scope, deliverables, or activities?
Via change request
What are some rules of thumb regarding costs for physical protection systems?
Design and engineering: 10-15%
Hardware and software: 15-20%
Installation: 40-50%
Training: 3-5%
Contingency: 10%
What is included in the detailed examination of risk analysis process?
Risk assessment
Vulnerability evaluation
Cost-benefit analysis
Risk management alternatives
In a system performance design how much expansion factor should be incorporated to the peak system load?
50%
When the budgetary estimate is prepared?
During the initial planning phase for new PPS
What is the amount of contingency for budgetary estimate?
Plus or minus 10 to 20%
When is prepared the preliminary design estimate?
At the 50% design review stage
What is the delay time when using diesel generator?
5 to 10 seconds
When is UPS recommended?
Security devices requiring 120 VAC power, such as computer and video monitors
What is the minimum time battery backup for security system components is required?
4 hours
What is the time required to recharge batteries automatically?
24 hours after discharge
When should the occurrence of single fault be indicated?
Within 200 seconds
How long should record from people entering the security control center be kept?
12 months
What are the tips to reduce nuisance alarm?
Post signs
Adjust guard patrol time
Check all doors with patrols
Routinely maintenance
Components inspections
What is the equation used to calculate the availability of the system?
OA = Tm/(Tm + Td) x 100
OA: operational availability
Tm: total test duration time
Td: system down time
What are one or multiple factors asset value can be based?
The cost of purchasing or replacing the asset;
The operational impact of unavailability of the asset;
The effects of harm to the asset;
The length of time required to replace the asset;
The reputational impact from unavailability of the asset
How cost-benefit analysis is based on?
Risk assessment
What an organizational strategy should adopt to develop cost-effective and robust approach to 4D and recover from disruptive event?
Defense in depth or layered protection
What a PPS should provide?
Protection in depth;
Minimum consequence of components failure;
Balance protection
What functions may be included in the scope of convergence?
Physical security
Cybersecurity
Information security
Business continuity
Crisis management
Environmental health and safety
CPTED approach focused on what?
Manipulating the physical environment;
Understanding human behavior in relation to physical environment;
Redesigning space or using it differently;
Increasing a sense of ownership and territoriality;
Reducing conflicts btw buildings
To underlie CPTED, All human spaces…
Has some designated purpose;
Has social, cultural, legal, or physical definitions;
Is designed to support and control the desired and acceptable behaviors
What are the zone protections the business design should have?
Public
Reception
Operations
Security
High security
Providing obstacles to deter, detect, delay, and deny access to a facility, asset, or operation utilizing natural and manufactured means, is referred to what?
Site hardening
What is considered in a delay in depth?
The strength of each obstacle in relation to the resources available to an adversary to overcome them. Time afforded by obstacle remaining counts towards the overall time to a response breach
What are other considerations in the application of security lighting system?
Avoid lighting of areas not intended for nighttime use;
Select a light safe route; prevent climbing opportunities;
Use photoelectric cells;
Continuous security lighting during hours of darkness
How is the success of the response in apprehending the adversary measured?
It is dependent upon the length of time it takes for the response force to become aware of an alarm, assess situation, and respond.
How is commonly referred the time of response force awareness?
Time of detection
To be effective, what a chain-link fence needs to avoid?
Overly large mesh fabric
Undersized wire
Lightweight posts and rails
Shallow post holes
What is the distance a bollard have to be spaced?
3 ft. (1 meter)