Phy Sec Flashcards
How system approach can be defined
System approach can be defined as a logical method for problem solving in which a comprehensive solution is developed in relation to a problem having several dimensions
What do you understand by Design Basis Threat
The Design Basis Threat (DBT) as the adversary against which the utility must be protected (Patterson, 2007). Determining the DBT required consideration of the threat type, tactics and mode or operations, capabilities, threat level, and likelihood of occurrence
Define risk management
Risk Management is coordinated activities to direct and control an organization with regard to risk
After the threats and assets are defined what is generally performed to establish a baseline of PPS effectiveness in meeting goals and objectives
Vulnerabilities assessment
What is vulnerability? What are the differences between vulnerability assessment and vulnerability analysis
Vulnerability assessment is the process of identifying and quantifying vulnerabilities. The term vulnerability analysis which is a method of identifying the weak points of a facility, entity, venue or person (ASIS, 2012) has also been used to describe this process. Vulnerability has been defined as intrinsic properties of something that create susceptibility to a source of risk that can lead to consequence (ISO/IEC 2009).Garcia. Vulnerability is a weakness that can be exploited by an adversary.
How residual risk is calculated
For now it is sufficient to note that risk captures the relationship among threats, asset value, and system effectiveness, and is often shown in this form, R = T x A x VT = threat, a combination of threat definition and like of attack A = assets to be protected V = vulnerability, represented by system effectiveness
What are the goals of a vulnerability assessment
The goal of VA is to identify PPS components in the functional areas of detection, delay and response and gather data to estimate their performance against particular threats
When the time for assessment is begin
Once an alarm is initiated and reported, it is time for assessment to begin
What is the principle of probability theory
It is a principle of probability theory that the larger the number of actual cases or events of the kind that includes the predicted event, the greater the agreement between the predicted pattern and the actual pattern of occurence
What are the key concepts must be understood before it is possible to design a system that meets the identified goals and objectives
These concepts are
1. System
2. Integration
3. System approach and
4. Risk Management
What is the basis of risk management
Informed decision making is the basis of risk management
As a security professional, when you say that the risk is conditional
Where there is no data to support an estimate, another approach is to assume that there will be an attack and then evaluate risk on this basis. In this case, the risk is conditional i.e the condition is that there will be an attack
While conducting vulnerability assessment what security systems engineer needs to understand
Security systems engineer needs to understand detection, delay and response technologies and security system integration
What are the key measures of effectiveness for the detection function
Key measures of effectiveness for the detection function are
- the probability of sending adversary action
- the time required for reporting and assessing the alarm
What is the primary job of a vulnerability assessment team
The VA teams primary job is to determine security system effectiveness
What is the difference between a system and integration
A system is a collection of products, process, or both, combined to provide a solution to a problem or goal. Integration is the combination of a variety of components (such as people, procedures and technology) to form a system
Write down the difference between compliance based VA and performance based VA
Compliance based approaches depend on conformance to specified policies or regulation, the metric for this analysis is the presence of the specified equipment and procedures. Performance bases approaches, on the other hand, actually evaluate how each element of the PPS operates and what it contributes to overall system effectiveness
What are the key to the vulnerability assessment
The key to the vulnerability assessment is to thoroughly evaluate the site PPS so that all paths to the assets are equally protected, and to consider what vulnerabilities exist given the defined threats, considering their motivation, tools, competence and knowledge
After the residual risk is calculated and then start the process for establishing PPS goals and objectives. The objective included what are the elements
This section described the process for establishing PPS goals and objectives. These objectives include threat definition, asset identification, and establishing acceptable risk levels to facilitate system design or before equipment is purchased.
How threat can be defined
Threat is combination of adversary capabilities, equipment, motivation or intent and likelihood of attack
What is threat spectrum
Threat spectrum is one of the methods of defining threats to a facility which uses categories or labels to describe the threat characteristics for various levels of threats
What do you mean by annualized loss expectancy
Annualized loss expectancy, is the product of the potential loss from an event and the likelihood of the event
What do you mean by risk
In general risk refers to the all the adverse outcomes that an organization wishes to avoid and is a function of the probability that such consequences will occur, the in magnitude, and their imminence
In risk assessment, that analyst attempts to answers what three questions
- What can go wrong
- What is the likelihood that it would go wrong
- What are the consequences
How to determine the baseline risk
System effectiveness, which is a measure of system vulnerability, is combined with threat and asset value to determine the baseline risk
What is the difference between false acceptance and false rejection
The false acceptance rate is the rate at which false identities or credentials are allowed entry, while the false rejection rate is the frequency of denying access to authorized personnel.
A type of systems approach follows three general steps, what are these steps
Assessment of vulnerability, implementation of countermeasures and evaluation of effectiveness
When a site is likely to be more vulnerable
If a sites PPS deviates from the functional integration of detection, delay and response, the site is likely to be more vulnerable
How general risk can be reduced
General risk can be reduced in three way
1. preventing an attack by detecting it before it is underway
2. protecting against attack
3. reducing mitigating consequences
What are the elements a risk management program should include? What are the approaches of risk management.
Risk management programs should include both risk financing (insurance) and risk control tools. Approaches include avoidance, reduction, spreading, transfer and acceptance
What do you mean by system effectivenss
System effectiveness is the ability of the PPS to prevent a successful attack once it has been initiated. Vulnerabilities are PPS weaknesses that can be exploited by adversaries.
What are the basis for vulnerability assessment
Verifying systems performance against the defined threats is the basis of vulnerability assessment
What can be the most useful information kept by an enterprise to determine probability of occurrence
Accurate historical information about losses or loss events can be among the most useful information kept by an enterprise.
A distribution curve based on what elements
A distribution curve based on the number of times various kind of events have occurred among other similar events indicates which events have a high probability of occurring again
What are the ways loss impact can be measures? What is the most way to measure loss impact
Loss impact can be measured in a variety of ways. One measure is the effect on employee morale, another is the effect on community relations. The most important measure overall is in dollars
Who are generally included in vulnerability assessment team
The team should also include a security systems engineer, response expert, data analyst, operations representatives, and subject matter experts (such as technical writers, locksmiths, explosives personnel, and legal and information systems experts)
What is the biggest mistake made when conducting a vulnerability assessment
The biggest mistake made when conducting a vulnerability assessment is to concentrate on individual PPS components and address upgrades only at the level, not at the level of overall system.
What is the foundation of a true analysis of the PPS ability to meet its defined objectives
Data collection is essential, as accurate data are the foundation for a true analysis of the PPS ability to meet its defined objectives
How effectiveness of delay is measured
Delay effectiveness is measured by the time required by the adversary (after detection) to bypass each delay element
How effectiveness of response is measured
Response effectiveness is measured by the time between receipt of a communication of adversary action and the interruption of the adversary action
How effectiveness of deployment is measured
Deployments effectiveness is measured in terms of the probability of deployment to the correct location (the adversary location) and the time required doing so
What is lumen
The quantity of light emitted by a lamp is measure in lumens
How to define lamps efficienty
The energy efficiency of the lighting is know as a lamps efficacy and is measured by the lamps output in lumens divided by the lamps power draw in watts
How CCT is measured
Corrected Color Temperature (CCT) is a measure of the warmth of coolness of a light
What component make a lamp
The lamp, also know as a light bulb is the manufactured light source that includes the filament or an arc tube, its glass casing, and its electrical connectors
What do you mean by illuminance
Illuminance is a the concentration of light over a particular area. Illuminance is measured in lux, representing the number of lumens per square meter or in foot candles (fc). the number of lumens per square foot. One foot candle is equal to 10.76 lux (often approximated to a ratio of 1:10)
What types of lights fall under the group of high intensity discharge lamps
In particular the high intensity discharge (HID) family of lamps (metal halide, mercury vapor and high pressure sodium)
What do you mean by uniformity
Achieving a uniform distribution of light, particularly outdoors, is expensive. Some variation in light levels is considered acceptable and is measured as uniformity, the ration between the average light level and the minimum light level
What is color rendition
The ability of a lamp to faithfully reproduce the colors seen in an object is know an rendition and is measured as a color rendition index (CRI) on a scale of 0 to 100
What is white balance
White balance is the automatic adjustment within a camera for the color temperature of the light source. This parameter can range from 2200 degree K to 7000 degree K
What do you understand by luminaire
The luminaire, also know as the fixture, is the complete lighting unit, consisting of the lamp, its holder, and the reflectors and diffuses used to distribute and focus the light.
What is the secondary function of Physical Protection System (PPS)
The secondary function of PPS is deterrence
What are the factors can be considered in designing deterrence
Certain factors in deterrence which are
1. the perceived likelihood of detection
2. the expected severity of punishment
3. deterrence may same as a first line of defense
What are the characteristics of PPS
The characteristics of PPS are
1. protection in depth
2. minimum consequences of component failures
3. balanced protection
What is the primary function of PPS
The primary function of PPS is
1. detection
2. delay
3. response
How to measure detection performance
Detection performance measure includes
- Probability of detection
- Time for communication and assessment
- Frequency of nuisance alarms
What are the considerations to be undertaken in designing balance protection
Consideration to design balanced protection
- minimum time to penetrate each barrier would be equal
- minimum probability of detecting penetration should be equal
- features design need to provide adequate protection against all threats on all possible paths.
- features also need to maintain balance with other consideration such as costs, safety and structural integrity
How the factors of vulnerabilities are exacerbated in a PPS
The factors of vulnerabilities in a PPS design is exacerbated by
- improper or limited training of operations or maintenance personnel
- ineffective or non existent procedures
What are the elements that the PPS design consideration specifically based
The physical protection system design consideration specifically based on the treat and asset at a site
What are the difference between protection in depth and balance protection
In protection in depth an adversary should be required to avoid or defeat a number of protective devices in sequence and an adversary will require a separate and distinct act for moving along the path. Balanced protection means that no matter how an adversary attempts to accomplish the goal, effective elements of the PPS will be encountered
How to measure response performance
Response performance measures includes
- probability of accurate communication to response force
- time to communicate
- probability of deployment to adversary location
- time to deploy
- response force effectiveness
How system effectiveness of PPS can be ensured
The importance of system effectiveness are
- hardware elements of the system must be installed maintained and operated properly
- training of personnel in policies, procedures and operation of equipment
- security safety and operational objectives must be accomplished at all times
What are the causes of vulnerabilities in PPS
The causes of vulnerabilities in physical protection system are
- improper component selection and installation
- maintenance
- operations
- system integration
What are the design principles and concepts are used in physical protection system
The design principle and concepts in physical protection system are
- deterrence (CPTED)
- detection (sensors, video sub systems and alarm assessment, lighting, alarm communication and display, entry control)
- delay (barriers)
- response
What are the elements need to be considered in designing PPS based on performance criteria
Considerations on performance criteria which are
- select elements and procedures according to the contribution they make to overall system performance
- values may be compared for existing (baseline) system and upgraded systems
- cost benefit analysis
What are the elements an integrated security system consists
Integrated system is consisting of
- people
- procedure
- equipment
What are the differences between Type 1 error and Type 2 error in biometric entry control system
A Type 1 error also called a false reject, is the improper rejection of a valid user
A Type 2 error or a false accept is the improper acceptance of an unauthorized person
What signature verification can best be used
Are best used in applications where signatures are already used to authorize transactions
What is the difference between entry control and access conrol
Entry control refers to the physical equipment used to control the movement of people or material into an area. Access control refers to the process of managing databases or other records and determining the parameters of authorized entry, such as who or what will be granted access, when they may enter, and where access will occur.
How the performance of entry control subsystems is measured
The performance measures of entry control subsystems include throughput and error rates
What is the difference between coercivity and oersted
The coercivity is defined as the magnetic intensity of an applied field required to change the information. The unit of magnetic intensity used to describe the coercivity is the oersted
What are the elements on which the verification of any entry control system are based on
This verification decision is usually based on determining whether the person
- is carrying a valid credential
- .know a valid personal identification number
- possesses the proper unique physical characteristic that matches the person characteristic recorded at enrollment (biometrics, such as fingerprint hand geometry, etc.)
When it is relatively easy to duplicate bar code
Unless the bar code is covered with an opaque covering. It is relatively easy to duplicate. This opaque covering is becoming more commonplace as the bar code badge moves into the security credential market
What is the name of the common credential used for personnel entry control
The photo identification badge is a common credential used for personnel entry control. But it is not always effective
What are the objectives of entry control system
The objectives of an entry control system used for physical protection are as follows
- to permit only authorized person to enter and exit
- to detect and prevent the entry or exit of contraband material (weapons, explosives)
- unauthorized tools. or critical assets
- to provide information to security personnel to facilitate assessment and response
How proximity badges can be classified
Proximity badges can be classified by the method of powering the badge, operating frequency range of the badge, and read only or read/write capability
What is the main advantage of smart card
The main advantage of smart card are its large memory and its high degree of resistance to forgery or compromise
Why 2% of population cannot be enrolled eye pattern recognition system
Approximately 2% of the population cannot be enrolled due to blindness or other iris damage, extremely dilated eyes, or very dark irises, so they require another method of granting secure access
In which places face recognition technology could be used
Face technology does have the appeal of non contact, and the potential to provide face in the crowd identification for identifying know or wanted criminals. This latter application could be useful in casinos, shopping malls, or other places where large crowds gather
What are the types of token is used in personnel entry control
Many types of tokens also called credentials are used in personnel entry control. They include the following
- photo identification badge
- exchange badge
- stored image badge
- coded credential
What is throughput
Throughput is a measure of the time it takes for an authorized person or material to successfully pass on entry or exit point
Coded credential systems, also called key card systems. Many techniques are available for coding a badge. What are the common techniques exist for coding a badge
The most common techniques include magnetic stripe, Wiegand wire, bar codes, proximity and smart cards
While doing explosive detection why bulk techniques should not be used on people
Usually the bulk techniques use ionizing radiation that is not suitable for use on people due to safety considerations
The lever lock is inherently susceptible to what
Although the level lock is inherently susceptible to picking, it can be designed to provide a high degree of lock security through resistance to picking.
Why making routine duplication of keys of a high security cylinder lock is quite difficult
In both types of high security locks, the keys are specially cut at specific angles, making routine duplication of keys quite difficult, except on special equipment used by the manufacturer
While doing package search, which method of search is not safe for use on personnel
In general, active interrogation methods are not safe for use on personnel
What is the most widely used method of controlling physical access
The locks is the most widely used method of controlling physical access
Which technology is most commonly used for package search
Using backscatter technologies, people can be safely imaged, although X ray technologies are most commonly used for package searches.
Write down the functional assemblies of components of a mechanical lock
In such a lock the functional assemblies of components are
- The bolt or latch that actually hold the movable part (door, window etc.) to the immovable part (jamb, frame etc.)
- The keeper or strike into which the bold or latch fits. the keeper is not an integral part of the lock mechanism that provides a secure housing for the bolt when in a locked position
- The tumbler array that constitutes the barrier or labyrinth that must be passed to move the bolt
- The key or unlocking device which is specifically designed to pass the barrier and operate the bolt.
What is the greatest weakness of warded lock
Technologies for standoff detection of explosives are in great demand because of the need to detect explosive devices from a safe distance
What are the basic elements of pin tumbler lock
The pin tumbler consists of the same basic elements as all mechanical locks, the bolt moving device, the maze or labyrinth and the keyway
What are the elements the locking policy should contain
Require that a systematic approach be taken to the use of locks for security purposes
1. Assign specific responsibility for the development of the lock program
2. Make all persons who will use or have access to keys, locks or access devices or combination information, responsible for compliance with program requirements.
What is the serious concern when designing an entry control system
Serious concern when designing an entry control system is the impact of fire codes
How maintenance of secure entry control can be achieved while addressing the fire code requirements simultaneously
An additional method of addressing fire code requirements while maintaining secure control includes the use of delayed exit hardware in which the door can be opened only after short period
What are the differences between a failsafe lock and fail secure lock
A fail safe locking mechanism is one that will unlock under any failure condition. The failure mode most commonly considered is loss of power but failure of the mechanism itself and any connected control device need to be considered also. A fail secure lock is one that will remain locked when power is lost of another failure occurs
Why system testing under normal, abnormal, and malevolent conditions should be performed to verify system performance when selecting a fully integrated locking system
Care must be taken when selecting a fully integrated system to ensure that system AC&D performance is not degraded by the entry control function. This is why system testing under normal, abnormal, and malevolent conditions should be performed to verify system performance.
Which type of locks are claimed to be immune from all the typical defeat modes or a regular mechanical combination lock as well as from electrical and magnetic attacks
Wafer tumbler lock claimed to be immune from all the typical defeat modes of a regular mechanical combination lock as well as from electrical and magnetic attacks
Electromagnetic lock is fail safe or fail secure
Electromagnetic locks are intrinsically fail safe because removal of power releases the strike plate.
What are the major security difficulties are presented by the master key technique
Three major security difficulties are presented by the master keying technique
- very effective master key accountability must be maintained
- in any manipulation of the lock additional positions or possibilities are presented for surreptitious unlocking by the creation of multiple shear liens or gate opening
- for cylinder locks the additional parts required in the lock core create the need for additional maintenance.
Where are the electric deadbolt lock typically mounted
The electric deadbolt is the oldest and simplest of all electrical locking devices. A solenoid (electro magnet) moves a deadbolt, typically mounted on a door frame, either into or out of a strike plate on a door. The mechanism can be either fail safe, automatically unlocking on the removal of power, or fail secure, remaining locked on the removal of power.
What types of security vulnerabilities exits for mechanical locks
Attack by force surreptitious attack and attack by impression making and try keys
Locking systems are coordinate arrays of mutually supportive and complimentary locking elements. They are based upon design plans which consider what are the elements
- The need for different concurrent levels of security control for locked spaces
- The likelihood that such levels will change with time. The probability that some or many users will require common access in some spaces and exclusive access in others
- The possibility that access devices (keys, cards or tokens) may be lost, compromised or damaged and
- The requirement that there be effective means for adapting the system to planned, as well as unanticipated changes
What is the typical application of the electric strike lock
In apartment houses, business offices, commercial installations and occupancies, what type of lock is used? A typical application of the electric strike is to control passage in one or both directions. Such devices have been used for many years in apartment houses, business officers, commercial installations and occupancies in general
In the path of egress what type of lock may be used
As noted above, a fail secure lock may be used on a door in the path of egress provided that free egress is available regardless of the state of the locks power or other control mechanisms
Why electric latch lock has advantage over the electric deadbolt lock
It has an advantage over the deadbolt because the latch does not need to be withdrawn for the door to close.
When PIR sensors are more effective
A PIR is most effective if
- if the target is forced to cross the detection pattern
- entering and exiting multiple detection segments
Where pyro electric detector is generally used
To protect corridors long pyro electric infrared single segment sensors are used. To protect large open areas multi segment pyro electric sensors are used
How microwave sensors can be defeated
The vulnerabilities of microwave sensor include
- slow moving targets
- absorption or reflection of microwave energy
- blockage of the field of view (such as by stacking boxes or moving furniture around in room)
- motion along the circumstances of the detection pattern
Where mono static sensors are generally used
Mono static microwave sensors are often used in the automatic door openers (supermarket, airports etc)
When detection level of microwave sensor is optimum and maximum
The detection level of microwave sensor is
1. optimum (when target is moving toward or away from the sensor)
2. maximum (when across the detection zone)
How continuity or breaking sensor can be defeated
Continuity or breaking sensor can be defeated through
1.the use of a jumper around a cut or
2. by movement of the wire to allow penetration
Where continuity or breaking sensors generally used
Continuity or breaking sensor generally to or enclosed in walls, ceiling or floor to detect penetration
Describe the working principles of Hall Effect switch function
Relying on the Hall Effect, devices in the switch unit measure and monitor the magnetic field strength of the magnetic unit. In a Hall Effect switch, if the Hall Effect devices measure enough magnetic field change, an alarm is generated. A Hall Effect switch is harder to tamper and defeat than a BMS
Where generally glass break sensors are mounted
Glass break sensors are mounted directly on the glass they are protecting and generate alarm when detect the frequencies associated with break glass (normally above 20 KHz)
Ceiling, floors of rooms, and walls and doors can be best protected by which type interior intrusion sensors
Interior areas such as ceiling, floors of rooms and walls and doors can be best protected by boundary penetration intrusion sensor
To detect what free standing infrared sensor often installed
Freestanding infrared sensor often installed to detect a human crawling and rolling on the ground across the microwave beam, keeping the body parallel to the beam.
As we know exterior sensors are exposed to electrical storms at most site, as a security practitioner what types of precautions needed to be undertaken to reduce lightning damage
Exterior sensors are exposed to electrical storm at most site. The precautions to lightning damage can be
- signal cables should be shielded, whether by their internal cable construction or by using metal conduit
- a good ground system is need which requires elimination of ground loops and use of grounds at a single point
- at the ends of the cables, passive transient suppression devices can be installed
What do you mean by sensor access mode
An access mode means the sensor alarms are temporarily masked so that alarms are not display at the alarm monitoring station
What is the another name of mono static sensors
Mono static microwave devices can serve as point sensors to provide limited coverage of a pencil or area
What is the difference between bypass and spoof
Bypass : any sensor can be defeated by going around its detection volume.
Spoof : is a technique that allows the target to pass through the sensors normal detection zone without generating an alarm.
How electric field or capacitance sensors detect an intrudre
Electric field or capacitance sensor
- active, visible and terrain following
- detect, a change in capacitive coupling among a set of wire attached to
- may be triggered by lightning, rain, fence motion and small animals
- difficult to defeat because the detection volume extends beyond the fence plane
How intruder can defeat VMD
Very slow movement through the detection zone can defeat most VMDs
The entire volume or a portion of the volume of a room or building can be protected by which type of intrusion detection system
Volumetric intrusion detection sensor can protect the entire volume or a portion of the volume of a room or building
Describe working principle of passive infrared sensor
The principle of passive infrared sensors are
- intruder must through the field of view of detector
- sensors can detect changes in the background thermal energy by someone moving through the detector field of view and hiding in the energy emanating from objects in the background
How shadow zones and incomplete coverage of microwave sensor occur
Shadow zones are incomplete coverage of microwave sensor can be created by metal objects (large bookcases, desk, computer monitor or fencing) in the protected area
What are the cause of nuisance alarms of freestanding infrared sensors
While using freestanding infrared sensors, causes of nuisance alarms are
- vegetaion is higher than 1.2 in (2.5 - 5.0 cm)
- nearby parallel chain link fence with loose mesh that flexes in the wind
- heavy blowing snow
- snow accumulation
How sensor can be classified
The method of sensor classification are
- passive or active
- covert or visible
- line of sight or terrain following
- volumetric or line of detection and
- application
What is recommended to achieve a high probability of detection at all times and under all expected weather conditions
To achieve a high probability of detection (PD) at all times and under all expected weather conditions, it is recommended to use of multiple sensors and to make contingency plan and procedures are needed.
How nuisance alarm of fence disturbance sensor can be reduced
Nuisance alarm of fence disturbance sensor can be reduced by using of rigid posts and tight fence fabric
What is the difference between bi static and mono static active intrusion sensor
Bi static active intrusion sensor is an active sensor installation, when transmitter and the receiver are installed separately. Mon static active intrusion sensor is an active sensor installation, when transmitter and the receiver are installed together
Write down the characteristics of intrusion sensor performance
The characteristics of Intrusion Sensor Performance are
- probability of detection (PD)
- nuisance alarm rate
- vulnerability to defeat
How ported coaxial cable sensor is affected
Ported coaxial cable sensor is affected by
- processor settings
- orientation of the intruder
- soil characteristics and
- the presence of meta
What are the determining factors for the performance of buried seismic sensor
For buried seismic sensors the conductivity of the medium is the determining factor. Wet soil generally has good seismic conduction, a characteristics that can lead to nuisance alarms from distant sources of seismic activity. Highly conductive soil reduces the detection volume of the sensor
Which types of sensor helps to achieve absolute alarm confirmation and a high probability of detection
Absolute alarm confirmation and a high probability of detection can be achieved by using dual technology sensors
What should be the installation procedures of infrared sensor
The installation procedures of infrared sensor are
- it should be installed away from heat source
- an infrared detector should not be mounted over or near radiators, heater, hot pipes or other heating elements
- radiant energy from those can produce thermal gradients and could cause nuisance alarms
Passive sensors are likely safer to use in which environment? Why active sensors create fewer nuisance alarms
Passive or active sensors may detect vibration, heat sound or capacitance
Active sensor include microwave, infrared and other radio frequency (RF) devices
Passive sensors is likely safer to use in environment containing explosive vapors or materials
Active sensors have the advantages of creating fewer nuisance alarms because of their stronger signals.
What are the disadvantages of microwave sensors
The disadvantages of microware sensor are
- can detect someone or something moving outside the protected areas or even outside the building
- requirement for completely rigid mounting
- susceptibility to pattern drift
- tendency to reflect off metallic objects
- need for special consideration in areas with light construction (e.g., glass, plasters, board, wood)
Write the defeat method of fence disturbance sensor
Defeat Methods of fence disturbance sensors are
tunneling under the fence
crossing above the fence without touching it.
How many electromechanical sensors can be defeated? Where generally this type of sensor installed
Electromechanical sensors are passive, visible. The most common type is a simple switch and generally installed on doors and windows. These units can be defeated easily by placing a strong magnet near the switch unit
What do you understand by maturity model
Maturity model is an approach for the decision makers and designers of security systems to select appropriate security technologies which will provide enhanced security within a finite budget
What types of sensor is called application based intrusion detection sensor
Application based intrusion detection sensor can be classified as
- boundary penetration sensor
- interior motions sensor
- proximity sensor
What are the common sources of nuisance alarms of microwave sensors
Common sources of nuisance alarms of microware sensors are
‘
1. movement of objects (non human) within and outside the detection zone
2. movement of small animals or birds
3. vibration allowed by poor sensors installation and mounting
4. ionized gas is fluorescent lights (60 hz rate of the ionization)
What should be importantly done before installing VMD in a facility
Before installing VMD in a facility it is important to perform tests on
- low profile target such as crawler and faster moving higher profile targets (such as people walking or running)
- under the lowest contrast lighting condition expected
What is the limitation of line detection sensor
Line detection sensors only detect an intruder if he or she violates a particular entry point of a detection zone
Who has the greatest opportunity to compromise sensors or the system
Insider among maintenance personnel has the greatest opportunity to compromise sensors or the system.
How video motion detectors can be defeated
Video motion detectors can be defeated
- by taking advantages of poor visibility conditions
- blending into the background
- increased sensitivity results in increase in the number of nuisance alarms.
How the probability of sensor fence is affected
The probability of detection of sensor fence is affected by
- tension of the wires.
- wire friction
- wire spacing
Which type of sensor and intruder can easily identify
Volumetric or line detection sensors
- a volumetric sensor generates alarms when an intruder enter the detection volume
- the detection zone is of a line detection sensor is usually easy for an intruder to identify
What are the factors that affect the probability of detection of intrusion detection system
The factors affect the probability of detection which are
- target to be detected
- sensor hardware design
- installation conditions
- sensitivity
What is the basic building block of an intrusion detection system
Sensors are the basic building blocks of an intrusion detection system
What is the most common measurement of the quality or detail in an analog image
Horizontal resolution
What we can refer a camera is megapixel
An imager that is made up of millions of pixel points
Based on which ability a lens should be chosed
For its ability to produce the desired identification information
When AGC is extremely useful
When the camera swings into an area that is just below minimum light requirement
What are the revolutions took place at the advent of digital video technology in relation to analog system
2:1 interlace was dropped, the real time video is no more 30 frames by second and it no longer held to NTSC or PAL standards
What lens formats would be suitable for a camera with chip size of 1/4 inch
1/4 inch of larger
Define sensitivity, resolution and camera’s feature
Sensitivity :Minimum amount of light required by the camera to produce an image
Resolution : Measure of the camera quality, specifically number of horizontal scan lines or digital pixel arrays
Cameras feature : AGC, electronic shuttering backlight compensation
What is the function of electronic iris
It de amplifies the super bright and amplifies the sub blacks, creating an equal 1Vpp video image
It is common to use different models within the same system. However what is important to verify when using cameras that were produced by different manufacturers within the same system
Need to verify compatibility of language and format
What is the function of electronic shuttering
To compensate for light changes without the use of automatic or manual iris lenses
What are the factors should be considered while determining the lens for a camera
Camera format, distance from the camera to the scene, and field of view.
When auto iris lens installed properly what it ensures
The video image remains at an average of one volt peak to peak (vpp) under optimal lighting conditions and as the video signal increases or decreases, the auto iris lens closes or open in direct proportion
What is the hardest task for a CCTV camera
To view a subject in front of a bright background
What is the common tool for controlling the brightness of an image focused onto a chip
Auto iris lens
What is the difference between NTSC and PAL
NTSC is 60 fields per second and 525 vertical lines
PAL 50 and 625
How is camera sensitivity expressed
Full light
Lower light
Low light
What is the function of automatic gain control (AGC)
To maintain the video signal at a specific level
In NTC the viewer sees 30 complete frames each second and all analog CCTC monitors and cameras employ a 2:1 interlace pattern. How many completed frames each person can see while viewing PAL
Usually 25 frames per second
What is the term given in dividing the CCTV image into a grid, and imposing different activation parameters on each grid
Masking
When most often phasing and sequencing problems arise
When cameras from different manufacturers are used on one system
The camera should be chosen before what
Lens
Why good video system is often waylaid
By expecting too much from a single unit or installing fewer cameras than are actually needed
What basically determines the amount and type of image will ultimately appear on the monitor
Lenses
When tunnel vision results occure
If the lens format size is too small the lens will not fill the imager with a picture
In your own way, explain what are the differences between subject, action and scene idenfitication
Subject identification is the ability to identify something or someone within the scene beyond a shadow of the doubt where action identification captures of what happens and scene identification recognizes a situation and its localization
If a camera will be mounted on the side of a building, 40 ft from the ground and the center of the scene is 30 ft from the building, what is the distance from the camera to the scene
Explain using the Pythagorean formula. Using Pythagorean theorem which states that A2=B2+C2 where B=40 ft and C=30 Ft, A2=[40x40] + [30x30] = 16000 + 900 = 2500 Sq Ft. A=50ft
In your own words explain the difference between AC/EC (video) or DC/LC lenses. (you may have to cross reference with other sources as the POA is a little confusing in this area)
AC/EC (video) : Uses the antiquated auto iris lens design. Auto iris increase cost of lens used for older cameras
DC/LC (lens) : Has no electronics into for the auto iris control but rather depends on the camera to supply it with the necessary positive or negative motor voltages to operate the iris, absence of auto iris reduced cost and enhance efficiency, currently in vogue
What basically determine the appropriate focal length for the lens
The field of view (height or width of the area being viewed)
For what reason you might use varifocal lens
Sometimes it is difficult to determine the exact field of view that a camera/lens match will produce. Other times there may be no standard fixed focal length lens available to get the desired field of view. A varifocal lens is a smaller version of a manual zoom lens that allows the installer to make fine adjustment on site to get the exact field of view. It also means that the installer has to carry around a smaller selection of lenses.
If required view is a narrow area at long distance which can be compared to a telescope, as it enables the user to look at objects far away as they are close. Long range considered anything over 50 ft (15.25 m). It is which type of lens
Telephoto Lens
It is important to note, that the more area the camera views, the less details it picks up. In that case by using which type of technology larger area of view may be obtained without losing the required details of image
Working with megapixel technology
How varifocal lenses differ from zoom lenses
They do not cover a full range from wide angle to telephoto but only a slight range on either side of a fixed local length standard lens. They do not have a tracking mechanism and must be refocused each time their range is changed.
An auto iris lens use a motor to open or close the iris. The need for more or less light is determined automatically by what
By the video sampling circuit in the lens or camera
The final size of the image determined by what
By the focal length of the lens
The selection of lens depends on what
The selection mainly depends on the size of the scene and the degree of visual identification required
What is the effective and fastest growing compression standard in the digital imaging market
H264
Regardless of the type of camera for transmitting the video signal from the camera to the monitor at distance of 1000 ft (305m) or more, which type of cable best to use
Fiber optic cable
What is the primary difference between a standard lens and megapixel lens
Megapixel lens is considered to be much higher quality lens
For an average scene at medium distance, a standard lens is needed. If you were sing a 1/3 inch lens with a 1/3 inch chip. what would be the focal length of the lends (measured in mm)
8.333 mm rounded down to 8 mm
The field of view is the final size of the viewing area as measured in width and height. analog systems create rectangular images that are four parts wide by three parts high (4*3). If the range is 12ft and then what must be height of the image
9ft
How IP cameras measure their resolution
As a multiple of the Common Intermediate Format (CIF), which is solution of 350*240. This means 352 pixels on a horizontal basis with 240 pixels on a vertical
What do you mean by 4 CIF
4 CIF means the user will have twice as many horizontal and twice as many vertical pixels to a single image or 707*480
After choosing a camera, what is the second most important decision of the video subsystem project
Choosing a lens
What is the primary factor in determining the resolution of an image
By the camera
The resolution of image can be determined by what
By the camera, by the transmission method, by the weakest link in the video system interface, by the reproduction capability of the image storage system.
How a digital image can be made smaller in both bandwidth and storage requirements
Through compression algorithms
Which type of camera work well in all indoor applications
Standard analog CCD cameras
What is basically IP camera
An IP camera is an IP addressable internet protocol digital camera, in effect a true digital camera that leverages the advantages of building a CCTV system around IT architecture. It can typically transmit also in analog format. It is a smart camera that performs multi functions such as digital video motion detection, facial recognition, privacy blocking and more.
If the video information is to be used in the courtroom, its admissibility may be determined by what
Quality of the recorded information, the way it was obtained, proof of originality, number of images per second/per camera that are best for the situation.
Where manufacturers equipment documentation should be preserved
At the using site as well as at a central document storage location
What are the parameters determine the effectiveness of a video assessment subsystem
- Minimum time between sensor alarm and video display to complete video coverage of the detection zone
- Ability to classify a 1ft target at the far edge of the assessment zone
- Vertical field of view at the far edge of exterior detection zone to account for the height of a fence and a person climbing on top of it
- Continuous operation, 24/7
- Minimal sensitivity to environmental conditions of minimal obstruction of the assessment zone
- Camera field of view and video recording system integration that display the alarm source to an operator
Camera selection primarily based on what
Sensitivity required for a full video output signal in the lighting environment in the area to be assessed
What is the important consideration in the camera selection process
Camera format
What affect the field of view, which dictates the number of lenses available in a variety of focal lengths
Camera format size
To support resting of video subsystem test targets can be used to verify video image quality. What should be geometric shapes of the target
That included a 1ft (0.3 m) diameter circle, a 1ft, square, and a 1ft high triangle
What is the use of simple method of checking for camera resolution
To use appropriately sized targets in the assessment zones and verify that they can be classified
What is test bench
Camera performance can also be verified in a laboratory using a test bench. This allows measurement of resolution, focus and sensitivity and can be more cost effective than performing testing.
BSK-W Solutions
Provide support to CPP, through systematic mentoring with help of Question Bank, Flashcards and Important notes
When it can be considered that a safe within a safe passes the test
The safe passe the test if the information loss after the fire does not exceed 1 percent
What can downfall the best designed vaults
Inadequate policies and procedures for opening and closing vaults are often the downfall of even the best designed vaults
How the fire and impact endurance test is carried out the safe within a safe
In the fire endurance test, the container is loaded with recorded tapes, discs, and microfilm. Two temperature limits are employed, 150 deg F (66 deg C) for magnetic tape and microfilm, and 125 deg F (52 deg C) for diskettes. The container is placed in a test furnace that starts with an interior temperature of 70 deg F (21 deg C). During the cooling cycle, the interior temperature and relative humidity are recorded until a temperature of 120 deg F(49 deg C) is reached. A second unit is also subjected to the fire impact test - a 30 ft (9 m) drop after heating
BSK W What is lifeblood of every organization
Records are the lifeblood of every organization
Where more often wire glass is used
Wire glass is used often in fire doors and fire windows
What is the time to penetrate most unenhanced windows with and tools
Most unenhanced windows can be penetrated with hand tools in less than 30 seconds
How to upgrade a panic bar equipped door
One way to upgrade the panic bar equipped door is to install a bent metal plate with a drill resistant steel sections fastened to it.
How the penetration resistance of windows and utility ports may be increased
The penetration resistance of windows and utility ports may be increased with grilles, a bards, expanded metal mesh or screens
Glass/polycarbonate composite glazing contains a tough core of polycarbonate between two layers of a glass. Where can glazing be used?
Glass/polycarbonate composite glazing contains a tough core or polycarbonate between two layers of glass. The glazing was developed for use in prisons.
How to define laminate glass
Laminated glass is made of two or more panes of annealed float, sheet or place glass bonded to a layer or layers of plastic
What is the optimum distance between the roof and secondary barrier
The optimum distance between the roof and the secondary barrier is 10 to 12 in (254 mm to 305 mm)
Where dispensable barriers are usually deployed
Dispensable barriers are usually deployed very near the assets being protected.
Which type of safe is not burglary resistant
A safe on wheels is not burglary resistant
By which organization a labelling service has been established to define the level of protection each safe can be expected to provide
A labelling service has been established by Underwriters Laboratories Inc (UL) to define the level of protection each safe can be expected to provide
What can be best path of an adversary to achieve forcible entry
In fact as wall may be an adversary’s path for forcible entry
When are picking tools and pipe wrench is used by a penetrator to open a lock
Picking tools work only if a keyway is available and a pipe wrench works only on exposed locking hardware
What is the average picking time for a skilled locksmith to pick a lock
The packing time depends on the type and condition of the lock but averages about one minute for a skilled locksmith.
Why light gauge vertical reinforcement channels are sometimes used inside hollow core doors
Light gauge vertical reinforcement channels are sometimes used inside hollow core doors to add strength and rigidity.
What are the elements that the delay provided by barriers greatly depends
The delay they provide depends greatly on the adversary’s tools and techniques
How the tasks of adversary can be made complicated
Delay in depth is analogous to protection in depth for detection systems. Placing several layers of varying barrier types along all possible path the adversary could take complicates the adversary task
How to determine the barriers ultimate value
The weakest portion of a barrier determines the barriers ultimate value
When a barrier is considered to be penetrated
A barrier is considered penetrated when a person passed through, over, under or around it
What is the first step in upgrading a facility’s resistance to penetration
Eliminated unnecessary door is the first step in upgrading a facility’s resistance to penetration
The penetration time depend on what? What types of attach tool can be used to penetrate a barrier
Barrier penetration time depends in part on the method of attack, including the necessary equipment. Attack tools considered in this chapter are
- Hand tools
- Power hand tools
- Abrasive water jets
- Vehicles
How response time can be shortened
Response time can be shortened by minimizing the time needed to assess the situation
On what element the selection and placement of barriers depends
The selection and placement of barriers depends on the adversarys objective
What is the disadvantage of using rolls of barbed tapes
Rolls of barbed tape tend to obscure CCTV views in the clear zone, thereby increasing assessment time
What concepts eyes on the street speaks about
Urban planner, Jane Jacobs developed concepts about eyes on the street, and proper land use to the creation of defensible space theory
How defensible space can be designed
Defensible space design link territoriality and surveillance by created design that leads people
- to consider the area as being within their sphere of influence
- a place where they have a responsibility to prevent crime.
According to the CPTED approach, when a design can be considered proper
In the CPTED approach, a design is proper if
- it recognized the designated use of the space
- defines the crime problem incidental
- defines the solution to problem compatible with the designated use
- incorporates the crime prevention strategies that enhance the effective use of the space
What do you understand by Capacity Threshold Theory
Capacity Threshold theory is also known as tipping point theory. This strategy balance land uses and urban. For example
- too many abandoned properties can tip an area into crime
- whereas balance of legitimate commercial properties can enhance livability
According to the CPTED approach, when a design can be considered proper
In the CPTED approach, a design is proper if
- it recognizes the designated use of the space
- defines the crime problem incidental
- defines the solution to problem compatible with the designated use
- incorporates the crime prevention strategies that enhance the effective use of the space
How CPTED strategies can be implemented
CPTED strategies can be implemented through
- organized method (staffing)
- mechanical methods (technology products)
- natural methods (site planning, design, landscaping and signage)
What is the most vulnerable asset to be protected
People are the most vulnerable asset to be protected
What approaches are adopted in situational crime prevention
Approaches to situational crime prevention are
- increasing the effort
- increasing the risks
- reducing anticipated rewards
- removing excuses
What are the purposes of security zoning
Purposes of security zoning are
- to allow employees, visitors, vendors and other to reach their destination
- to prevent them from entering areas whereas they have no business
Define natural access control, natural surveillance and natural territorial reinforcement
Natural access control means the idea is to employ both real and symbolic barriers including doors, fences and bushes to define and limit access to a building or other space. Natural surveillance means increasing visibility by occupants and casual observers increases the detection of trespassers or misconduct at a facility, Natural Territorial reinforcement means this is the process of establishing a sense of ownership, responsibility and accountability in property owners, managers or occupants to increase vigilance in identifying tress passers.
Basing on what categories architects and engineers are called to implement security measures
The standards call on architects and engineers to implement security measures in four different categories which are
- perimeter and exterior security
- entry security
- interior security
- security planning
To apply CPTED what needs to be understood
Applying CPTED requires an understanding of basis crime prevention theory practice
What do you understand by crime prevention assumptions
Crime prevention assumption emphasis must be given to the environment of the potential victim rather than that of the potential criminal, crime prevention is practical, not moralistic, reducing criminal motivation by reducing opportunities to commit crime and crime prevention strategies should focus on the act not the perpetrator.
According to the CPTED theory what do you mean by natural measures
Natural measures include such as
- good space planning
- well defined building entrance
- arranging courtyards, patios and porches for unobstructed lines of sight
- provide specific guidance for the use of space
- provide architectural landscaping
- enhance visibility actions
What are the strategies included in situational crime prevention approaches
Situational crime prevention includes strategies
- to reduce crime motives and opportunities
- simulating the conscience of potential offenders
When likelihood of crime increase
The likelihood of crime increase when a potential criminal feels that
- the chances of detection and identification are low
- the chances of escape are high