Phy Sec Flashcards
How system approach can be defined
System approach can be defined as a logical method for problem solving in which a comprehensive solution is developed in relation to a problem having several dimensions
What do you understand by Design Basis Threat
The Design Basis Threat (DBT) as the adversary against which the utility must be protected (Patterson, 2007). Determining the DBT required consideration of the threat type, tactics and mode or operations, capabilities, threat level, and likelihood of occurrence
Define risk management
Risk Management is coordinated activities to direct and control an organization with regard to risk
After the threats and assets are defined what is generally performed to establish a baseline of PPS effectiveness in meeting goals and objectives
Vulnerabilities assessment
What is vulnerability? What are the differences between vulnerability assessment and vulnerability analysis
Vulnerability assessment is the process of identifying and quantifying vulnerabilities. The term vulnerability analysis which is a method of identifying the weak points of a facility, entity, venue or person (ASIS, 2012) has also been used to describe this process. Vulnerability has been defined as intrinsic properties of something that create susceptibility to a source of risk that can lead to consequence (ISO/IEC 2009).Garcia. Vulnerability is a weakness that can be exploited by an adversary.
How residual risk is calculated
For now it is sufficient to note that risk captures the relationship among threats, asset value, and system effectiveness, and is often shown in this form, R = T x A x VT = threat, a combination of threat definition and like of attack A = assets to be protected V = vulnerability, represented by system effectiveness
What are the goals of a vulnerability assessment
The goal of VA is to identify PPS components in the functional areas of detection, delay and response and gather data to estimate their performance against particular threats
When the time for assessment is begin
Once an alarm is initiated and reported, it is time for assessment to begin
What is the principle of probability theory
It is a principle of probability theory that the larger the number of actual cases or events of the kind that includes the predicted event, the greater the agreement between the predicted pattern and the actual pattern of occurence
What are the key concepts must be understood before it is possible to design a system that meets the identified goals and objectives
These concepts are
1. System
2. Integration
3. System approach and
4. Risk Management
What is the basis of risk management
Informed decision making is the basis of risk management
As a security professional, when you say that the risk is conditional
Where there is no data to support an estimate, another approach is to assume that there will be an attack and then evaluate risk on this basis. In this case, the risk is conditional i.e the condition is that there will be an attack
While conducting vulnerability assessment what security systems engineer needs to understand
Security systems engineer needs to understand detection, delay and response technologies and security system integration
What are the key measures of effectiveness for the detection function
Key measures of effectiveness for the detection function are
- the probability of sending adversary action
- the time required for reporting and assessing the alarm
What is the primary job of a vulnerability assessment team
The VA teams primary job is to determine security system effectiveness
What is the difference between a system and integration
A system is a collection of products, process, or both, combined to provide a solution to a problem or goal. Integration is the combination of a variety of components (such as people, procedures and technology) to form a system
Write down the difference between compliance based VA and performance based VA
Compliance based approaches depend on conformance to specified policies or regulation, the metric for this analysis is the presence of the specified equipment and procedures. Performance bases approaches, on the other hand, actually evaluate how each element of the PPS operates and what it contributes to overall system effectiveness
What are the key to the vulnerability assessment
The key to the vulnerability assessment is to thoroughly evaluate the site PPS so that all paths to the assets are equally protected, and to consider what vulnerabilities exist given the defined threats, considering their motivation, tools, competence and knowledge
After the residual risk is calculated and then start the process for establishing PPS goals and objectives. The objective included what are the elements
This section described the process for establishing PPS goals and objectives. These objectives include threat definition, asset identification, and establishing acceptable risk levels to facilitate system design or before equipment is purchased.
How threat can be defined
Threat is combination of adversary capabilities, equipment, motivation or intent and likelihood of attack
What is threat spectrum
Threat spectrum is one of the methods of defining threats to a facility which uses categories or labels to describe the threat characteristics for various levels of threats
What do you mean by annualized loss expectancy
Annualized loss expectancy, is the product of the potential loss from an event and the likelihood of the event
What do you mean by risk
In general risk refers to the all the adverse outcomes that an organization wishes to avoid and is a function of the probability that such consequences will occur, the in magnitude, and their imminence
In risk assessment, that analyst attempts to answers what three questions
- What can go wrong
- What is the likelihood that it would go wrong
- What are the consequences
How to determine the baseline risk
System effectiveness, which is a measure of system vulnerability, is combined with threat and asset value to determine the baseline risk
What is the difference between false acceptance and false rejection
The false acceptance rate is the rate at which false identities or credentials are allowed entry, while the false rejection rate is the frequency of denying access to authorized personnel.
A type of systems approach follows three general steps, what are these steps
Assessment of vulnerability, implementation of countermeasures and evaluation of effectiveness
When a site is likely to be more vulnerable
If a sites PPS deviates from the functional integration of detection, delay and response, the site is likely to be more vulnerable
How general risk can be reduced
General risk can be reduced in three way
1. preventing an attack by detecting it before it is underway
2. protecting against attack
3. reducing mitigating consequences
What are the elements a risk management program should include? What are the approaches of risk management.
Risk management programs should include both risk financing (insurance) and risk control tools. Approaches include avoidance, reduction, spreading, transfer and acceptance
What do you mean by system effectivenss
System effectiveness is the ability of the PPS to prevent a successful attack once it has been initiated. Vulnerabilities are PPS weaknesses that can be exploited by adversaries.
What are the basis for vulnerability assessment
Verifying systems performance against the defined threats is the basis of vulnerability assessment
What can be the most useful information kept by an enterprise to determine probability of occurrence
Accurate historical information about losses or loss events can be among the most useful information kept by an enterprise.
A distribution curve based on what elements
A distribution curve based on the number of times various kind of events have occurred among other similar events indicates which events have a high probability of occurring again
What are the ways loss impact can be measures? What is the most way to measure loss impact
Loss impact can be measured in a variety of ways. One measure is the effect on employee morale, another is the effect on community relations. The most important measure overall is in dollars
Who are generally included in vulnerability assessment team
The team should also include a security systems engineer, response expert, data analyst, operations representatives, and subject matter experts (such as technical writers, locksmiths, explosives personnel, and legal and information systems experts)
What is the biggest mistake made when conducting a vulnerability assessment
The biggest mistake made when conducting a vulnerability assessment is to concentrate on individual PPS components and address upgrades only at the level, not at the level of overall system.
What is the foundation of a true analysis of the PPS ability to meet its defined objectives
Data collection is essential, as accurate data are the foundation for a true analysis of the PPS ability to meet its defined objectives
How effectiveness of delay is measured
Delay effectiveness is measured by the time required by the adversary (after detection) to bypass each delay element
How effectiveness of response is measured
Response effectiveness is measured by the time between receipt of a communication of adversary action and the interruption of the adversary action
How effectiveness of deployment is measured
Deployments effectiveness is measured in terms of the probability of deployment to the correct location (the adversary location) and the time required doing so
What is lumen
The quantity of light emitted by a lamp is measure in lumens
How to define lamps efficienty
The energy efficiency of the lighting is known as lamps efficacy and is measured by the lamps output in lumens divided by the lamps power draw in watts
How CCT is measured
Corrected Color Temperature (CCT) is a measure of the warmth of coolness of a light
What component make a lamp
The lamp, also known as a light bulb is the manufactured light source that includes the filament or an arc tube, its glass casing, and its electrical connectors
What do you mean by illuminance
Illuminance is a the concentration of light over a particular area. Illuminance is measured in lux, representing the number of lumens per square meter or in foot candles (fc). the number of lumens per square foot. One foot candle is equal to 10.76 lux (often approximated to a ratio of 1:10)
What types of lights fall under the group of high intensity discharge lamps
In particular the high intensity discharge (HID) family of lamps (metal halide, mercury vapor and high pressure sodium)
What do you mean by uniformity
Achieving a uniform distribution of light, particularly outdoors, is expensive. Some variation in light levels is considered acceptable and is measured as uniformity, the ratio between the average light level and the minimum light level
What is color rendition
The ability of a lamp to faithfully reproduce the colors seen in an object is know an rendition and is measured as a color rendition index (CRI) on a scale of 0 to 100
What is white balance
White balance is the automatic adjustment within a camera for the color temperature of the light source. This parameter can range from 2200 degree K to 7000 degree K
What do you understand by luminaire
The luminaire, also know as the fixture, is the complete lighting unit, consisting of the lamp, its holder, and the reflectors and diffuses used to distribute and focus the light.
What is the secondary function of Physical Protection System (PPS)
The secondary function of PPS is deterrence
What are the factors can be considered in designing deterrence
Certain factors in deterrence which are
1. the perceived likelihood of detection
2. the expected severity of punishment
3. deterrence may same as a first line of defense
What are the characteristics of PPS
The characteristics of PPS are
1. protection in depth
2. minimum consequences of component failures
3. balanced protection
What is the primary function of PPS
The primary function of PPS is
1. detection
2. delay
3. response
How to measure detection performance
Detection performance measure includes
- Probability of detection
- Time for communication and assessment
- Frequency of nuisance alarms
What are the considerations to be undertaken in designing balance protection
Consideration to design balanced protection
- minimum time to penetrate each barrier would be equal
- minimum probability of detecting penetration should be equal
- features design need to provide adequate protection against all threats on all possible paths.
- features also need to maintain balance with other consideration such as costs, safety and structural integrity
How the factors of vulnerabilities are exacerbated in a PPS
The factors of vulnerabilities in a PPS design is exacerbated by
- improper or limited training of operations or maintenance personnel
- ineffective or non existent procedures
What are the elements that the PPS design consideration specifically based
The physical protection system design consideration specifically based on the treat and asset at a site
What are the difference between protection in depth and balance protection
In protection in depth an adversary should be required to avoid or defeat a number of protective devices in sequence and an adversary will require a separate and distinct act for moving along the path. Balanced protection means that no matter how an adversary attempts to accomplish the goal, effective elements of the PPS will be encountered
How to measure response performance
Response performance measures includes
- probability of accurate communication to response force
- time to communicate
- probability of deployment to adversary location
- time to deploy
- response force effectiveness
How system effectiveness of PPS can be ensured
The importance of system effectiveness are
- hardware elements of the system must be installed maintained and operated properly
- training of personnel in policies, procedures and operation of equipment
- security safety and operational objectives must be accomplished at all times
What are the causes of vulnerabilities in PPS
The causes of vulnerabilities in physical protection system are
- improper component selection and installation
- maintenance
- operations
- system integration
What are the design principles and concepts are used in physical protection system
The design principle and concepts in physical protection system are
- deterrence (CPTED)
- detection (sensors, video sub systems and alarm assessment, lighting, alarm communication and display, entry control)
- delay (barriers)
- response
What are the elements need to be considered in designing PPS based on performance criteria
Considerations on performance criteria which are
- select elements and procedures according to the contribution they make to overall system performance
- values may be compared for existing (baseline) system and upgraded systems
- cost benefit analysis
What are the elements an integrated security system consists
Integrated system is consisting of
- people
- procedure
- equipment
What are the differences between Type 1 error and Type 2 error in biometric entry control system
A Type 1 error also called a false reject, is the improper rejection of a valid user
A Type 2 error or a false accept is the improper acceptance of an unauthorized person
What signature verification can best be used
Are best used in applications where signatures are already used to authorize transactions
What is the difference between entry control and access conrol
Entry control refers to the physical equipment used to control the movement of people or material into an area. Access control refers to the process of managing databases or other records and determining the parameters of authorized entry, such as who or what will be granted access, when they may enter, and where access will occur.
How the performance of entry control subsystems is measured
The performance measures of entry control subsystems include throughput and error rates
What is the difference between coercivity and oersted
The coercivity is defined as the magnetic intensity of an applied field required to change the information. The unit of magnetic intensity used to describe the coercivity is the oersted
What are the elements on which the verification of any entry control system are based on
This verification decision is usually based on determining whether the person
- is carrying a valid credential
- know a valid personal identification number
- possesses the proper unique physical characteristic that matches the person characteristic recorded at enrollment (biometrics, such as fingerprint hand geometry, etc.)
When it is relatively easy to duplicate bar code
Unless the bar code is covered with an opaque covering. It is relatively easy to duplicate. This opaque covering is becoming more commonplace as the bar code badge moves into the security credential market
What is the name of the common credential used for personnel entry control
The photo identification badge is a common credential used for personnel entry control. But it is not always effective
What are the objectives of entry control system
The objectives of an entry control system used for physical protection are as follows
- to permit only authorized person to enter and exit
- to detect and prevent the entry or exit of contraband material (weapons, explosives)
- unauthorized tools. or critical assets
- to provide information to security personnel to facilitate assessment and response
How proximity badges can be classified
Proximity badges can be classified by the method of powering the badge, operating frequency range of the badge, and read only or read/write capability
What is the main advantage of smart card
The main advantage of smart card are its large memory and its high degree of resistance to forgery or compromise
Why 2% of population cannot be enrolled eye pattern recognition system
Approximately 2% of the population cannot be enrolled due to blindness or other iris damage, extremely dilated eyes, or very dark irises, so they require another method of granting secure access
In which places face recognition technology could be used
Face technology does have the appeal of non contact, and the potential to provide face in the crowd identification for identifying know or wanted criminals. This latter application could be useful in casinos, shopping malls, or other places where large crowds gather
What are the types of token is used in personnel entry control
Many types of tokens also called credentials are used in personnel entry control. They include the following
- photo identification badge
- exchange badge
- stored image badge
- coded credential
What is throughput
Throughput is a measure of the time it takes for an authorized person or material to successfully pass on entry or exit point
Coded credential systems, also called key card systems. Many techniques are available for coding a badge. What are the common techniques exist for coding a badge
The most common techniques include magnetic stripe, Wiegand wire, bar codes, proximity and smart cards
While doing explosive detection why bulk techniques should not be used on people
Usually the bulk techniques use ionizing radiation that is not suitable for use on people due to safety considerations
The lever lock is inherently susceptible to what
Although the lever lock is inherently susceptible to picking, it can be designed to provide a high degree of lock security through resistance to picking.
Why making routine duplication of keys of a high security cylinder lock is quite difficult
In both types of high security locks, the keys are specially cut at specific angles, making routine duplication of keys quite difficult, except on special equipment used by the manufacturer
While doing package search, which method of search is not safe for use on personnel
In general, active interrogation methods are not safe for use on personnel
What is the most widely used method of controlling physical access
The locks is the most widely used method of controlling physical access
Which technology is most commonly used for package search
Using backscatter technologies, people can be safely imaged, although X ray technologies are most commonly used for package searches.
Write down the functional assemblies of components of a mechanical lock
In such a lock the functional assemblies of components are
- The bolt or latch that actually hold the movable part (door, window etc.) to the immovable part (jamb, frame etc.)
- The keeper or strike into which the bold or latch fits. the keeper is not an integral part of the lock mechanism that provides a secure housing for the bolt when in a locked position
- The tumbler array that constitutes the barrier or labyrinth that must be passed to move the bolt
- The key or unlocking device which is specifically designed to pass the barrier and operate the bolt.
What is the greatest weakness of warded lock
Technologies for standoff detection of explosives are in great demand because of the need to detect explosive devices from a safe distance
What are the basic elements of pin tumbler lock
The pin tumbler consists of the same basic elements as all mechanical locks, the bolt moving device, the maze or labyrinth and the keyway
What are the elements the locking policy should contain
Require that a systematic approach be taken to the use of locks for security purposes
1. Assign specific responsibility for the development of the lock program
2. Make all persons who will use or have access to keys, locks or access devices or combination information, responsible for compliance with program requirements.
What is the serious concern when designing an entry control system
Serious concern when designing an entry control system is the impact of fire codes
How maintenance of secure entry control can be achieved while addressing the fire code requirements simultaneously
An additional method of addressing fire code requirements while maintaining secure control includes the use of delayed exit hardware in which the door can be opened only after short period
What are the differences between a failsafe lock and fail secure lock
A fail safe locking mechanism is one that will unlock under any failure condition. The failure mode most commonly considered is loss of power but failure of the mechanism itself and any connected control device need to be considered also. A fail secure lock is one that will remain locked when power is lost of another failure occurs
Why system testing under normal, abnormal, and malevolent conditions should be performed to verify system performance when selecting a fully integrated locking system
Care must be taken when selecting a fully integrated system to ensure that system AC&D performance is not degraded by the entry control function. This is why system testing under normal, abnormal, and malevolent conditions should be performed to verify system performance.
Which type of locks are claimed to be immune from all the typical defeat modes or a regular mechanical combination lock as well as from electrical and magnetic attacks
Wafer tumbler lock claimed to be immune from all the typical defeat modes of a regular mechanical combination lock as well as from electrical and magnetic attacks
Electromagnetic lock is fail safe or fail secure
Electromagnetic locks are intrinsically fail safe because removal of power releases the strike plate.
What are the major security difficulties are presented by the master key technique
Three major security difficulties are presented by the master keying technique
- very effective master key accountability must be maintained
- in any manipulation of the lock additional positions or possibilities are presented for surreptitious unlocking by the creation of multiple shear liens or gate opening
- for cylinder locks the additional parts required in the lock core create the need for additional maintenance.
Where are the electric deadbolt lock typically mounted
The electric deadbolt is the oldest and simplest of all electrical locking devices. A solenoid (electro magnet) moves a deadbolt, typically mounted on a door frame, either into or out of a strike plate on a door. The mechanism can be either fail safe, automatically unlocking on the removal of power, or fail secure, remaining locked on the removal of power.
What types of security vulnerabilities exits for mechanical locks
Attack by force surreptitious attack and attack by impression making and try keys
Locking systems are coordinate arrays of mutually supportive and complimentary locking elements. They are based upon design plans which consider what are the elements
- The need for different concurrent levels of security control for locked spaces
- The likelihood that such levels will change with time. The probability that some or many users will require common access in some spaces and exclusive access in others
- The possibility that access devices (keys, cards or tokens) may be lost, compromised or damaged and
- The requirement that there be effective means for adapting the system to planned, as well as unanticipated changes
What is the typical application of the electric strike lock
In apartment houses, business offices, commercial installations and occupancies, what type of lock is used? A typical application of the electric strike is to control passage in one or both directions. Such devices have been used for many years in apartment houses, business officers, commercial installations and occupancies in general
In the path of egress what type of lock may be used
As noted above, a fail secure lock may be used on a door in the path of egress provided that free egress is available regardless of the state of the locks power or other control mechanisms
Why electric latch lock has advantage over the electric deadbolt lock
It has an advantage over the deadbolt because the latch does not need to be withdrawn for the door to close.
When PIR sensors are more effective
A PIR is most effective if
- if the target is forced to cross the detection pattern
- entering and exiting multiple detection segments
Where pyro electric detector is generally used
To protect corridors long pyro electric infrared single segment sensors are used. To protect large open areas multi segment pyro electric sensors are used
How microwave sensors can be defeated
The vulnerabilities of microwave sensor include
- slow moving targets
- absorption or reflection of microwave energy
- blockage of the field of view (such as by stacking boxes or moving furniture around in room)
- motion along the circumstances of the detection pattern
Where mono static sensors are generally used
Mono static microwave sensors are often used in the automatic door openers (supermarket, airports etc)
When detection level of microwave sensor is optimum and maximum
The detection level of microwave sensor is
1. optimum (when target is moving toward or away from the sensor)
2. maximum (when across the detection zone)
How continuity or breaking sensor can be defeated
Continuity or breaking sensor can be defeated through
1.the use of a jumper around a cut or
2. by movement of the wire to allow penetration
Where continuity or breaking sensors generally used
Continuity or breaking sensor generally to or enclosed in walls, ceiling or floor to detect penetration
Describe the working principles of Hall Effect switch function
Relying on the Hall Effect, devices in the switch unit measure and monitor the magnetic field strength of the magnetic unit. In a Hall Effect switch, if the Hall Effect devices measure enough magnetic field change, an alarm is generated. A Hall Effect switch is harder to tamper and defeat than a BMS
Where generally glass break sensors are mounted
Glass break sensors are mounted directly on the glass they are protecting and generate alarm when detect the frequencies associated with break glass (normally above 20 KHz)
Ceiling, floors of rooms, and walls and doors can be best protected by which type interior intrusion sensors
Interior areas such as ceiling, floors of rooms and walls and doors can be best protected by boundary penetration intrusion sensor
To detect what free standing infrared sensor often installed
Freestanding infrared sensor often installed to detect a human crawling and rolling on the ground across the microwave beam, keeping the body parallel to the beam.
As we know exterior sensors are exposed to electrical storms at most site, as a security practitioner what types of precautions are needed to be undertaken to reduce lightning damage
Exterior sensors are exposed to electrical storm at most site. The precautions to lightning damage can be
- signal cables should be shielded, whether by their internal cable construction or by using metal conduit
- a good ground system is need which requires elimination of ground loops and use of grounds at a single point
- at the ends of the cables, passive transient suppression devices can be installed
What do you mean by sensor access mode
An access mode means the sensor alarms are temporarily masked so that alarms are not display at the alarm monitoring station
What is the another name of mono static sensors
Mono static microwave devices can serve as point sensors to provide limited coverage of a pencil or area
What is the difference between bypass and spoof
Bypass : any sensor can be defeated by going around its detection volume.
Spoof : is a technique that allows the target to pass through the sensors normal detection zone without generating an alarm.
How electric field or capacitance sensors detect an intruder
Electric field or capacitance sensor
- active, visible and terrain following
- detect, a change in capacitive coupling among a set of wire attached to
- may be triggered by lightning, rain, fence motion and small animals
- difficult to defeat because the detection volume extends beyond the fence plane
How intruder can defeat VMD
Very slow movement through the detection zone can defeat most VMDs
The entire volume or a portion of the volume of a room or building can be protected by which type of intrusion detection system
Volumetric intrusion detection sensor can protect the entire volume or a portion of the volume of a room or building
Describe working principle of passive infrared sensor
The principle of passive infrared sensors are
- intruder must through the field of view of detector
- sensors can detect changes in the background thermal energy by someone moving through the detector field of view and hiding in the energy emanating from objects in the background
How shadow zones and incomplete coverage of microwave sensor occur
Shadow zones are incomplete coverage of microwave sensor can be created by metal objects (large bookcases, desk, computer monitor or fencing) in the protected area
What are the cause of nuisance alarms of freestanding infrared sensors
While using freestanding infrared sensors, causes of nuisance alarms are
- vegetaion is higher than 1.2 in (2.5 - 5.0 cm)
- nearby parallel chain link fence with loose mesh that flexes in the wind
- heavy blowing snow
- snow accumulation
How sensor can be classified
The method of sensor classification are
- passive or active
- covert or visible
- line of sight or terrain following
- volumetric or line of detection and
- application
What is recommended to achieve a high probability of detection at all times and under all expected weather conditions
To achieve a high probability of detection (PD) at all times and under all expected weather conditions, it is recommended to use of multiple sensors and to make contingency plan and procedures are needed.
How nuisance alarm of fence disturbance sensor can be reduced
Nuisance alarm of fence disturbance sensor can be reduced by using of rigid posts and tight fence fabric
What is the difference between bi static and mono static active intrusion sensor
Bi static active intrusion sensor is an active sensor installation, when transmitter and the receiver are installed separately. Mono static active intrusion sensor is an active sensor installation, when transmitter and the receiver are installed together
Write down the characteristics of intrusion sensor performance
The characteristics of Intrusion Sensor Performance are
- probability of detection (PD)
- nuisance alarm rate
- vulnerability to defeat
How ported coaxial cable sensor is affected
Ported coaxial cable sensor is affected by
- processor settings
- orientation of the intruder
- soil characteristics and
- the presence of meta
What are the determining factors for the performance of buried seismic sensor
For buried seismic sensors the conductivity of the medium is the determining factor. Wet soil generally has good seismic conduction, a characteristics that can lead to nuisance alarms from distant sources of seismic activity. Highly conductive soil reduces the detection volume of the sensor
Which types of sensor helps to achieve absolute alarm confirmation and a high probability of detection
Absolute alarm confirmation and a high probability of detection can be achieved by using dual technology sensors
What should be the installation procedures of infrared sensor
The installation procedures of infrared sensor are
- it should be installed away from heat source
- an infrared detector should not be mounted over or near radiators, heater, hot pipes or other heating elements
- radiant energy from those can produce thermal gradients and could cause nuisance alarms
Passive sensors are likely safer to use in which environment? Why active sensors create fewer nuisance alarms
Passive or active sensors may detect vibration, heat sound or capacitance
Active sensor include microwave, infrared and other radio frequency (RF) devices
Passive sensors is likely safer to use in environment containing explosive vapors or materials
Active sensors have the advantages of creating fewer nuisance alarms because of their stronger signals.
What are the disadvantages of microwave sensors
The disadvantages of microware sensor are
- can detect someone or something moving outside the protected areas or even outside the building
- requirement for completely rigid mounting
- susceptibility to pattern drift
- tendency to reflect off metallic objects
- need for special consideration in areas with light construction (e.g., glass, plasters, board, wood)
Write the defeat method of fence disturbance sensor
Defeat Methods of fence disturbance sensors are
tunneling under the fence
crossing above the fence without touching it.
How many electromechanical sensors can be defeated? Where generally this type of sensor installed
Electromechanical sensors are passive, visible. The most common type is a simple switch and generally installed on doors and windows. These units can be defeated easily by placing a strong magnet near the switch unit
What do you understand by maturity model
Maturity model is an approach for the decision makers and designers of security systems to select appropriate security technologies which will provide enhanced security within a finite budget
What types of sensor is called application based intrusion detection sensor
Application based intrusion detection sensor can be classified as
- boundary penetration sensor
- interior motions sensor
- proximity sensor
What are the common sources of nuisance alarms of microwave sensors
Common sources of nuisance alarms of microware sensors are
‘
1. movement of objects (non human) within and outside the detection zone
2. movement of small animals or birds
3. vibration allowed by poor sensors installation and mounting
4. ionized gas is fluorescent lights (60 hz rate of the ionization)
What should be importantly done before installing VMD in a facility
Before installing VMD in a facility it is important to perform tests on
- low profile target such as crawler and faster moving higher profile targets (such as people walking or running)
- under the lowest contrast lighting condition expected
What is the limitation of line detection sensor
Line detection sensors only detect an intruder if he or she violates a particular entry point of a detection zone
Who has the greatest opportunity to compromise sensors or the system
Insider among maintenance personnel has the greatest opportunity to compromise sensors or the system.
How video motion detectors can be defeated
Video motion detectors can be defeated
- by taking advantages of poor visibility conditions
- blending into the background
- increased sensitivity results in increase in the number of nuisance alarms.
How the probability of sensor fence is affected
The probability of detection of sensor fence is affected by
- tension of the wires.
- wire friction
- wire spacing
Which type of sensor an intruder can easily identify
Volumetric or line detection sensors
- a volumetric sensor generates alarms when an intruder enter the detection volume
- the detection zone is of a line detection sensor is usually easy for an intruder to identify
What are the factors that affect the probability of detection of intrusion detection system
The factors affect the probability of detection which are
- target to be detected
- sensor hardware design
- installation conditions
- sensitivity
What is the basic building block of an intrusion detection system
Sensors are the basic building blocks of an intrusion detection system
What is the most common measurement of the quality or detail in an analog image
Horizontal resolution
What we can refer a camera is megapixel
An imager that is made up of millions of pixel points
Based on which ability a lens should be chosed
For its ability to produce the desired identification information
When AGC is extremely useful
When the camera swings into an area that is just below minimum light requirement
What are the revolutions took place at the advent of digital video technology in relation to analog system
2:1 interlace was dropped, the real time video is no more 30 frames by second and it no longer held to NTSC or PAL standards
What lens formats would be suitable for a camera with chip size of 1/4 inch
1/4 inch of larger
Define sensitivity, resolution and camera’s feature
Sensitivity :Minimum amount of light required by the camera to produce an image
Resolution : Measure of the camera quality, specifically number of horizontal scan lines or digital pixel arrays
Cameras feature : AGC, electronic shuttering backlight compensation
What is the function of electronic iris
It de amplifies the super bright and amplifies the sub blacks, creating an equal 1Vpp video image
It is common to use different models within the same system. However what is important to verify when using cameras that were produced by different manufacturers within the same system
Need to verify compatibility of language and format
What is the function of electronic shuttering
To compensate for light changes without the use of automatic or manual iris lenses
What are the factors should be considered while determining the lens for a camera
Camera format, distance from the camera to the scene, and field of view.
When auto iris lens installed properly what it ensures
The video image remains at an average of one volt peak to peak (vpp) under optimal lighting conditions and as the video signal increases or decreases, the auto iris lens closes or open in direct proportion
What is the hardest task for a CCTV camera
To view a subject in front of a bright background
What is the common tool for controlling the brightness of an image focused onto a chip
Auto iris lens
What is the difference between NTSC and PAL
NTSC is 60 fields per second and 525 vertical lines
PAL 50 and 625
How is camera sensitivity expressed
Full light
Lower light
Low light
What is the function of automatic gain control (AGC)
To maintain the video signal at a specific level
In NTC the viewer sees 30 complete frames each second and all analog CCTC monitors and cameras employ a 2:1 interlace pattern. How many completed frames each person can see while viewing PAL
Usually 25 frames per second
What is the term given in dividing the CCTV image into a grid, and imposing different activation parameters on each grid
Masking
When most often phasing and sequencing problems arise
When cameras from different manufacturers are used on one system
The camera should be chosen before what
Lens
Why good video system is often waylaid
By expecting too much from a single unit or installing fewer cameras than are actually needed
What basically determines the amount and type of image will ultimately appear on the monitor
Lenses
When tunnel vision results occure
If the lens format size is too small the lens will not fill the imager with a picture
In your own way, explain what are the differences between subject, action and scene idenfitication
Subject identification is the ability to identify something or someone within the scene beyond a shadow of the doubt where action identification captures of what happens and scene identification recognizes a situation and its localization
If a camera will be mounted on the side of a building, 40 ft from the ground and the center of the scene is 30 ft from the building, what is the distance from the camera to the scene
Explain using the Pythagorean formula. Using Pythagorean theorem which states that A2=B2+C2 where B=40 ft and C=30 Ft, A2=[40x40] + [30x30] = 16000 + 900 = 2500 Sq Ft. A=50ft
In your own words explain the difference between AC/EC (video) or DC/LC lenses. (you may have to cross reference with other sources as the POA is a little confusing in this area)
AC/EC (video) : Uses the antiquated auto iris lens design. Auto iris increase cost of lens used for older cameras
DC/LC (lens) : Has no electronics into for the auto iris control but rather depends on the camera to supply it with the necessary positive or negative motor voltages to operate the iris, absence of auto iris reduced cost and enhance efficiency, currently in vogue
What basically determine the appropriate focal length for the lens
The field of view (height or width of the area being viewed)
For what reason you might use varifocal lens
Sometimes it is difficult to determine the exact field of view that a camera/lens match will produce. Other times there may be no standard fixed focal length lens available to get the desired field of view. A varifocal lens is a smaller version of a manual zoom lens that allows the installer to make fine adjustment on site to get the exact field of view. It also means that the installer has to carry around a smaller selection of lenses.
If required view is a narrow area at long distance which can be compared to a telescope, as it enables the user to look at objects far away as they are close. Long range considered anything over 50 ft (15.25 m). It is which type of lens
Telephoto Lens
It is important to note, that the more area the camera views, the less details it picks up. In that case by using which type of technology larger area of view may be obtained without losing the required details of image
Working with megapixel technology
How varifocal lenses differ from zoom lenses
They do not cover a full range from wide angle to telephoto but only a slight range on either side of a fixed local length standard lens. They do not have a tracking mechanism and must be refocused each time their range is changed.
An auto iris lens use a motor to open or close the iris. The need for more or less light is determined automatically by what
By the video sampling circuit in the lens or camera
The final size of the image determined by what
By the focal length of the lens
The selection of lens depends on what
The selection mainly depends on the size of the scene and the degree of visual identification required
What is the effective and fastest growing compression standard in the digital imaging market
H264
Regardless of the type of camera for transmitting the video signal from the camera to the monitor at distance of 1000 ft (305m) or more, which type of cable best to use
Fiber optic cable
What is the primary difference between a standard lens and megapixel lens
Megapixel lens is considered to be much higher quality lens
For an average scene at medium distance, a standard lens is needed. If you were using a 1/3 inch lens with a 1/3 inch chip. what would be the focal length of the lens (measured in mm)
8.333 mm rounded down to 8 mm
The field of view is the final size of the viewing area as measured in width and height. analog systems create rectangular images that are four parts wide by three parts high (4*3). If the range is 12ft and then what must be height of the image
9ft
How IP cameras measure their resolution
As a multiple of the Common Intermediate Format (CIF), which is solution of 350*240. This means 352 pixels on a horizontal basis with 240 pixels on a vertical
What do you mean by 4 CIF
4 CIF means the user will have twice as many horizontal and twice as many vertical pixels to a single image or 707*480
After choosing a camera, what is the second most important decision of the video subsystem project
Choosing a lens
What is the primary factor in determining the resolution of an image
By the camera
The resolution of image can be determined by what
By the camera, by the transmission method, by the weakest link in the video system interface, by the reproduction capability of the image storage system.
How a digital image can be made smaller in both bandwidth and storage requirements
Through compression algorithms
Which type of camera work well in all indoor applications
Standard analog CCD cameras
What is basically IP camera
An IP camera is an IP addressable internet protocol digital camera, in effect a true digital camera that leverages the advantages of building a CCTV system around IT architecture. It can typically transmit also in analog format. It is a smart camera that performs multi functions such as digital video motion detection, facial recognition, privacy blocking and more.
If the video information is to be used in the courtroom, its admissibility may be determined by what
Quality of the recorded information, the way it was obtained, proof of originality, number of images per second/per camera that are best for the situation.
Where manufacturers equipment documentation should be preserved
At the using site as well as at a central document storage location
What are the parameters determine the effectiveness of a video assessment subsystem
- Minimum time between sensor alarm and video display to complete video coverage of the detection zone
- Ability to classify a 1ft target at the far edge of the assessment zone
- Vertical field of view at the far edge of exterior detection zone to account for the height of a fence and a person climbing on top of it
- Continuous operation, 24/7
- Minimal sensitivity to environmental conditions of minimal obstruction of the assessment zone
- Camera field of view and video recording system integration that display the alarm source to an operator
Camera selection primarily based on what
Sensitivity required for a full video output signal in the lighting environment in the area to be assessed
What is the important consideration in the camera selection process
Camera format
What affect the field of view, which dictates the number of lenses available in a variety of focal lengths
Camera format size
To support resting of video subsystem test targets can be used to verify video image quality. What should be geometric shapes of the target
That included a 1ft (0.3 m) diameter circle, a 1ft, square, and a 1ft high triangle
What is the use of simple method of checking for camera resolution
To use appropriately sized targets in the assessment zones and verify that they can be classified
What is test bench
Camera performance can also be verified in a laboratory using a test bench. This allows measurement of resolution, focus and sensitivity and can be more cost effective than performing testing.
When it can be considered that a safe within a safe passes the test
The safe passe the test if the information loss after the fire does not exceed 1 percent
What can downfall the best designed vaults
Inadequate policies and procedures for opening and closing vaults are often the downfall of even the best designed vaults
How the fire and impact endurance test is carried out the safe within a safe
In the fire endurance test, the container is loaded with recorded tapes, discs, and microfilm. Two temperature limits are employed, 150 deg F (66 deg C) for magnetic tape and microfilm, and 125 deg F (52 deg C) for diskettes. The container is placed in a test furnace that starts with an interior temperature of 70 deg F (21 deg C). During the cooling cycle, the interior temperature and relative humidity are recorded until a temperature of 120 deg F(49 deg C) is reached. A second unit is also subjected to the fire impact test - a 30 ft (9 m) drop after heating
Where more often wire glass is used
Wire glass is used often in fire doors and fire windows
What is the time to penetrate most unenhanced windows with and tools
Most unenhanced windows can be penetrated with hand tools in less than 30 seconds
How to upgrade a panic bar equipped door
One way to upgrade the panic bar equipped door is to install a bent metal plate with a drill resistant steel sections fastened to it.
How the penetration resistance of windows and utility ports may be increased
The penetration resistance of windows and utility ports may be increased with grilles, a bards, expanded metal mesh or screens
Glass/polycarbonate composite glazing contains a tough core of polycarbonate between two layers of a glass. Where can glazing be used?
Glass/polycarbonate composite glazing contains a tough core or polycarbonate between two layers of glass. The glazing was developed for use in prisons.
How to define laminate glass
Laminated glass is made of two or more panes of annealed float, sheet or place glass bonded to a layer or layers of plastic
What is the optimum distance between the roof and secondary barrier
The optimum distance between the roof and the secondary barrier is 10 to 12 in (254 mm to 305 mm)
Where dispensable barriers are usually deployed
Dispensable barriers are usually deployed very near the assets being protected.
Which type of safe is not burglary resistant
A safe on wheels is not burglary resistant
By which organization a labelling service has been established to define the level of protection each safe can be expected to provide
A labelling service has been established by Underwriters Laboratories Inc (UL) to define the level of protection each safe can be expected to provide
What can be best path of an adversary to achieve forcible entry
In fact as wall may be an adversary’s path for forcible entry
When are picking tools and pipe wrench is used by a penetrator to open a lock
Picking tools work only if a keyway is available and a pipe wrench works only on exposed locking hardware
What is the average picking time for a skilled locksmith to pick a lock
The packing time depends on the type and condition of the lock but averages about one minute for a skilled locksmith.
Why light gauge vertical reinforcement channels are sometimes used inside hollow core doors
Light gauge vertical reinforcement channels are sometimes used inside hollow core doors to add strength and rigidity.
What are the elements that the delay provided by barriers greatly depends
The delay they provide depends greatly on the adversary’s tools and techniques
How the tasks of adversary can be made complicated
Delay in depth is analogous to protection in depth for detection systems. Placing several layers of varying barrier types along all possible path the adversary could take complicates the adversary task
How to determine the barriers ultimate value
The weakest portion of a barrier determines the barriers ultimate value
When a barrier is considered to be penetrated
A barrier is considered penetrated when a person passed through, over, under or around it
What is the first step in upgrading a facility’s resistance to penetration
Eliminated unnecessary door is the first step in upgrading a facility’s resistance to penetration
The penetration time depend on what? What types of attach tool can be used to penetrate a barrier
Barrier penetration time depends in part on the method of attack, including the necessary equipment. Attack tools considered in this chapter are
- Hand tools
- Power hand tools
- Abrasive water jets
- Vehicles
How response time can be shortened
Response time can be shortened by minimizing the time needed to assess the situation
On what element the selection and placement of barriers depends
The selection and placement of barriers depends on the adversarys objective
What is the disadvantage of using rolls of barbed tapes
Rolls of barbed tape tend to obscure CCTV views in the clear zone, thereby increasing assessment time
What concepts eyes on the street speaks about
Urban planner, Jane Jacobs developed concepts about eyes on the street, and proper land use to the creation of defensible space theory
How defensible space can be designed
Defensible space design link territoriality and surveillance by created design that leads people
- to consider the area as being within their sphere of influence
- a place where they have a responsibility to prevent crime.
According to the CPTED approach, when a design can be considered proper
In the CPTED approach, a design is proper if
- it recognized the designated use of the space
- defines the crime problem incidental
- defines the solution to problem compatible with the designated use
- incorporates the crime prevention strategies that enhance the effective use of the space
What do you understand by Capacity Threshold Theory
Capacity Threshold theory is also known as tipping point theory. This strategy balance land uses and urban. For example
- too many abandoned properties can tip an area into crime
- whereas balance of legitimate commercial properties can enhance livability
According to the CPTED approach, when a design can be considered proper
In the CPTED approach, a design is proper if
- it recognizes the designated use of the space
- defines the crime problem incidental
- defines the solution to problem compatible with the designated use
- incorporates the crime prevention strategies that enhance the effective use of the space
How CPTED strategies can be implemented
CPTED strategies can be implemented through
- organized method (staffing)
- mechanical methods (technology products)
- natural methods (site planning, design, landscaping and signage)
What is the most vulnerable asset to be protected
People are the most vulnerable asset to be protected
What approaches are adopted in situational crime prevention
Approaches to situational crime prevention are
- increasing the effort
- increasing the risks
- reducing anticipated rewards
- removing excuses
What are the purposes of security zoning
Purposes of security zoning are
- to allow employees, visitors, vendors and other to reach their destination
- to prevent them from entering areas whereas they have no business
Define natural access control, natural surveillance and natural territorial reinforcement
Natural access control means the idea is to employ both real and symbolic barriers including doors, fences and bushes to define and limit access to a building or other space. Natural surveillance means increasing visibility by occupants and casual observers increases the detection of trespassers or misconduct at a facility, Natural Territorial reinforcement means this is the process of establishing a sense of ownership, responsibility and accountability in property owners, managers or occupants to increase vigilance in identifying tress passers.
Basing on what categories architects and engineers are called to implement security measures
The standards call on architects and engineers to implement security measures in four different categories which are
- perimeter and exterior security
- entry security
- interior security
- security planning
To apply CPTED what needs to be understood
Applying CPTED requires an understanding of basis crime prevention theory practice
What do you understand by crime prevention assumptions
Crime prevention assumption emphasis must be given to the environment of the potential victim rather than that of the potential criminal, crime prevention is practical, not moralistic, reducing criminal motivation by reducing opportunities to commit crime and crime prevention strategies should focus on the act not the perpetrator.
According to the CPTED theory what do you mean by natural measures
Natural measures include such as
- good space planning
- well defined building entrance
- arranging courtyards, patios and porches for unobstructed lines of sight
- provide specific guidance for the use of space
- provide architectural landscaping
- enhance visibility actions
What are the strategies included in situational crime prevention approaches
Situational crime prevention includes strategies
- to reduce crime motives and opportunities
- simulating the conscience of potential offenders
When likelihood of crime increase
The likelihood of crime increase when a potential criminal feels that
- the chances of detection and identification are low
- the chances of escape are high
Write down the components of Newmans study
The four components of Newman’s study were to
- define perceived zones of territorial influence
- provide surveillance opportunities for residents and their guests
- place residential structures close to safe areas
- design sites and buildings to these occupants are not perceived as stigmatized or vulnerable
According to the exploration of Newman, by implementing what are the elements crimes can be reduced
Newman explored human territoriality, natural surveillance and the modification of existing structures to reduce crime
What are the components in 3 D concepts
CPTED strategy is also now as 3 D concepts which are
defined
designated
designed
What is the ultimate purpose of CPTED
To reduce crime opportunity and fear of crime
What is important to choose first for the right physical security measures and apply them appropriately?
To choose the right physical security measures and apply them appropriately, it is important to first conduct a risk assessment
CPTED relies on what?
Crime prevention design solutions should be integrated into the design and function of the buildings, or at least the location where they are being implemented. CPTED relies on an awareness of how people use space for legitimate and illegitimate purpose
What is building envelope and what it serve?
Building envelope: The separation between the interior and the exterior environments of a building. It serves as the outer shell to protect the indoor environment as well as to facilitate its climate control.
What is risk assessment?
The process of assessing security‐related risks from internal and external threats‐to an entity, its assets, or personnel
What is risk management
A business discipline consisting of three major functions: loss prevention, loss control and loss indemnificatory
What routine activity theory suggests
Routinely activity theory suggests that a suitable guardian will prevent criminal activity from occurring. Criminals will generally avoid targets or victims when police, security, door staff, neighbors or others are in position to observe and react
What is CCT rating
Corrected Colour Temperature (CCT) is a measure of the warmth or coolness of a light. It is measured in degrees Kelvin which is the Centigrade (Celsius) absolute temperature scale where 0OK is approximately 272OC
What is security survey
A thorough physical examination of a facility and its systems and procedures, conducted to assess the current level of security, locate deficiencies and gauge of protection needed
What is stand‐off distance or set back
Stand‐off distance/ set back: The distance between the asset and the threat, typically regarding an explosive threat.
What is tailgating
To follow closely. In access control, the attempt by more than one individual to enter a controlled area by immediately follows an individual with proper access. Also called piggybacking.
When a space will naturally have less opportunity for criminal activity
Natural or Architectural measures Designing of space to ensure the overall environment works more effectively for the intended users; while at the same time deterring crime. A space will naturally have less opportunity for criminal activity when it is effectively used. Poor layout reduces the ability of intended users to apply appropriate measures.
Explain progressive collapse
Progressive collapse: Occurs when the failure of a primary structural element results in the failure of adjoining structural elements, which in turn causes further structural failure. The resulting damage progresses to other parts of the structure, resulting in a partial or total collapse of the building.
What is risk
The likelihood of loss resulting from a threat, security incident, or event
What is threat
An action or event that could result in a loss; an indication that such an action or event might take place.
What is throughput
The average rate of flow of people or vehicles through an access point
What is token
An electronically encoded device (i.e. a card, key‐fob, etc.) that contains information being read by electronic devices placed within or at the entry and exit points of a protected facility.
Based on CPTED, explain organizational measures
Focus on policies activities that encourage observation, reporting and where appropriate intervention this would include education for individuals and groups of strategies they can take to protect themselves and the space they occupy. It would also entail routine patrol and enforcement by security, law enforcement or others.
Explain natural territorial reinforcement boundary definition
Natural territorial reinforcement boundary definition: Establishing a sense of ownership by facility owners or building occupants to define territory to potential aggressors and to assist legitimate occupants or users to increase vigilance in identifying who belongs on the property and who does not. The theory holds that people will pay more attention to and defend a particular space or territory from trespass if they feel a form of “psychological ownership” in the area. Thus, it is possible‐through real or symbolic markers‐to encourage tenants or employees to defend property from incursion
Wooden fences are used for(a)……………………..Wooden fence’s effectiveness can be enhanced by adding(b)………………………… When utilizing a wood and fence to delay entry, the vertical picket sections must be (c)……………………. and the horizontal sections should be (d),…………………….. located on the(e)………………………..
(a) low‐security applications,
(b) barbed wire, razor wire, or metal spikes,
(c) no wider than 1‐3/4 inches,
(d) 50 inches apart
(e) protected side of the building.
The width of the clear zone depends on what? When exception can be made in relation to the clear zone
Wherever possible and practical, a clear zone should separate a perimeter barrier from structures inside the protected area. The width of the clear zone will depend upon the threat that is being protected against. An exception can be made when a building wall constitutes part of the perimeter barrier
Explain four design features of chain‐link fence
1‐Height: The higher the barrier, the more difficult and time‐ consuming it is to breach. For low security requirements, a 5‐6 ft. (1.5‐1.8 meter) fence may be sufficient; for medium security, a 7 ft. (2.1meter) fence may be appropriate; and for high security (such as a prison), an 18‐20 ft. (5.4‐6.0 meter) fence maybe required,
2-Barbed wire: Barbed wires vary in gauge, coating weight, number of barbs, and spacing of barbs. If chain link or expanded metal fences are intended to discourage human trespassing, barbed wire should be installed atop the fence on an outward facing top guard at a45 degree angle,
3‐Bottom rail: Properly anchored, this prevents an intruder from forcing the mesh up to crawl under it,
4‐ Top rail: A horizontal member of a fence top to which fabric is attached with ties or clips at intervals not exceeding two feet. A top rail generally improves the appearance of a fence, but it also offers a handhold to those installed.
What broken windows theory speaks about
The “broken windows” theory suggests that an abandoned building or car can remain Unmolested indefinitely, but once the first window is broken, the building or car is quickly vandalized. Maintenance of building and its physical elements (such as lighting, landscaping, paint, signage, fencing and walkways) is critical for defining territoriality
In relation to chain‐link fence what prevents an intruder from forcing the mesh up?
Burying / Mow strip: Burying or installing a mow strip (concrete), in addition to a chain‐ link fabric 1 ft. (0.3 meters) or more, prevents an intruder from forcing the mesh up.
What fence or wall can do?
Fence or wall can do the following:
1‐Give notice of the legal boundary of the premises,
2-Help channel entry through a secured area by deterring entry elsewhere along the boundary,
3‐Provide a zone for installing intrusion detection equipment and video surveillance system,
4‐Deter casual intruders from penetrating a secured area,
5‐’Force an intruder to demonstrate his or her intent to enter the property,
6‐ Cause a delay in access, thereby increasing the possibility of detection,
7‐Create a psychological deterrent,
8‐ Reduce the number of security officers required,
9‐Demonstrate a facility’s concern for security
Explain the concept of compartmentalization
One of the basic CPTED strategies is to design multiple or concentric layers of security measures so that highly protected assets are behind multiple barriers. Layers of security strategies or elements start from the outer perimeter and move inward to the area of the building with the greatest need for protection. Each layer is designed to delay an attacker as much as possible. This strategy is also known as protection‐in‐depth (Fay, 1993, p672). If properly planned, the delay should either discourage a penetration or assist in controlling it by providing time for an adequate response
Explain double fencing
An additional line of security fencing a minimum of10 ft. to 20 ft. (3 meters to 6 meters) inside the perimeter fence creates a controlled area and room for sensors or a perimeter patrol road between the fences
Where welded wire fabric is generally used
Welded wire fabric, which is cheaper than expanded metal, is generally used for lower risk applications.
What affects the amount of protection required
The value of an asset being protected affects the amount of protection required.
Which strategy should be used while selecting physical barriers and the barriers designed to address the specific threats?
A threat basis design strategy should be used when selecting physical barriers and the barriers designed to address the specific threats.
What is the most common perimeter barrier
The most common perimeter barriers are fencing and walls. However, fences and walls usually only deter or delay entry‐they do not prevent it entirely
Against what Chain‐link fence effective
Chain‐link fences are quick to install, can be effective against pedestrian trespassers and animals and provide visibility to both sides of the fence.
By using which types of tools chain‐link fence can be breached easily?
Chain‐link fence fabric is made from steel or aluminum wire (which may be coated), which is wound and interwoven to provide a continuous mesh. It can be breached easily with a blanket, wire cutter, or bolt cutter.
What types of protection window film can provide
Window film can be designed, tested, and applied to:
1‐Provide varying degrees of protection from intrusion or “smash and grab”. It can generally be defeated with repeated attacks,
2‐Reduce injury from projectile shards of glass in case of an explosion or blast force,
3‐Reduce injury form projectile penetration in case of extreme weather (i.e., hurricane or tornado
Electric security fences consist of (a)……………… supported by posts fitted with insulators. These fences can be (b) ………………for wall top security, or (c) ………….. for high security sites. Most industrial applications are 8ft (2.4m) high with (d) ………
a) a close wire grid,
(b) simple 5 wire systems,
(c) multi‐zoned systems with up to 50 wires,
(d) 20 wires and are fitted to the inside of the chain link perimeter fence.
What is the difference between deterrent fence and monitored fence
Electric security fences come in two forms:
1) the all live wire “deterrent” fence that relies on the human fear of electric shock; or more commonly
2) the “monitored” fence, where in addition to the fear factor, the fence will detect cutting or climbing of the wires and trigger an alarm. Monitored fences are usually integrated with intruder alarm or access control systems and‐increasingly‐with surveillance cameras
Most building intrusions are effected through what.
Most building intrusions are effected through doors and windows
Annealed or plate glass has been manufactured to control (a) ……………. such that it can be subjected to fabrication. Regular plate, float, sheet, rolled, and some patterned surface glasses are examples of (b)…………………… Annealed glass breaks into large shards that can cause (c)…………………..and building codes may restrict its use in places where (d) ……………………………………….such as door panels and fire exits.
(a) residual stresses
(b) annealed glass.
(c) serious injury,
(d) there is a high risk of breakage and injury
What types of measures can be taken to strengthen the doors
Measures can be taken to strengthen the doors by adding steel plate for reinforcement anchoring frames, and adding kick plates, using set screws in hinges or spot welding hinges.
(a) ……………. is composed of two sheets of ordinary glass bonded to a middle layer or layers of plastic sheeting material. When laminated glass is stressed or struck, it may crack and break but the pieces of glass tend to adhere to the plastic materials. It is also the preferred glass type (b) …………………………. It will aid in the protection of building occupants from (c) …………………………………. in the event of an explosion.
(a) Laminated glass,
(b) for mitigating blast forces,
(c) glass shattering
(a)……………….. or burglar resistant provides stronger resistance to attack. It is laminated and consists of multiple plies of glass, polycarbonate, and other plastic films to provide (b) ……………………
(a) Bullet‐resistant
(b) many levels of ballistic resistance
Describe working principle of credential‐operated locks
Credential‐operated locks rely on a unique card or other device being presented to a card reader at a location where the access is being controlled. The system electronically checks the information (including the identification of the cardholder and the time period when access is permitted) on the card and compares it with the information already entry or denies access.
What are the key factors to be considered in hardening a facility
Key factors in hardening a facility include:
1‐ stand‐off distance,
2‐structural integrity of the premises against attack,
3‐ prevention of progressive collapse,
4‐ redundancy of operating systems.
………………………. , a single key operates a series of mechanical locks, and each of those locks is also operated with another key specific to that lock. Since the compromise of a master key can compromise an entire facility, the use of any master key must be strictly controlled.
In a master key system
What type of curtains provides protection from flying materials in an explosion?
Blast curtains are made of reinforced fabrics that provide protection from flying materials in an explosion.
What are the measures needed to consider to decide whom to let into a facility and whom to keep out, it is necessary to?
Measures such as:
1‐Tokens or other items in the person’s possession(such as a metal key; a proximity, insertion, or swipe card or a photo identification card),
2‐Private information known by the individual (such as a password or personal identification number,
3‐ Biometric features of the person (such as fingerprint, hand geometry, iris and retinal patterns, signatures or speech patterns)
What types of attack an adversary might adopt to defeat an access control point?
An adversary may use several types of attacks to defeat an access control point:
1‐Deceit: employee to permit entry,
2‐ Direct physical attack: The adversary uses tools to force entry into an area,
3‐Technical attack: The adversary forges a credential, guesses a personal identification number, or obtains another person’s credential.
Typically what are the purposes of security lighting
Typically, the purposes of security lighting‐discouraging unauthorized entry, protecting employees and visitors on site, and detecting intruders‐are served both outdoor and indoor
Electronic access control systems validate (a) ……………………….. which can be in the form of something you know, (b) ……………………… or something you carry. Components of central database, software, supplementary interfaces to external systems, and (d)…………………………………
(a) one or more credentials
(b) something that is inherent to you,
(c) communication cabling distributed processor,
(d) applications for request‐to‐exit devices for applicable doors.
How progressive collapse can be prevented?
Prevention of progressive collapse, accomplished by structural design that prevents the loss a primary structural member from causing the further failure of primary structural members beyond the local damage zone.
Mechanical locks – such as door locks, cabinet locks and padlock use an arrangement of physical parts to prevent the opening of the bolt or latch. The two major components in most mechanical locks are the……………………………………….
a) architecturally significant
b) mechanical latching otherwise with safety codes.
Which types of lamps are the least efficient, the most expensive to operate, and have a short life span?
Incandescent lamps are the least efficient, the most expensive to operate, and have a short life span
The quality of IDS and its components greatly affects its usefulness. How deficiencies in IDS can harm a security program?
The quality of IDS and its components greatly affects its usefulness. Deficiencies can harm a security program by causing the system to:
1‐Fail to detect an intruder,
2‐Falsely report breaches(nuisance and unintentional) which generate costly and repeated deployment of security or law enforcement and maintenance personnel,
3‐Create excessive false activations so that alarms are ignored or security and law enforcement officers are called unnecessarily. (Many jurisdictions levy fines for excessive numbers of false alarm calls to police,
4‐Provide a false sense of security
The right level or intensity of lighting depends on what?
How intensity of lighting can be measured? The right level or intensity of lighting depends on a site’s overall security requirements. Lighting intensity can be measured within instruments in lux and foot‐candles
Which light projects a downward circular pattern illumination?
Streetlight
Where generally floodlights are used
Floodlight projects a medium to wide beam on a larger area. It is used in a variety of setting including the perimeters of commercial, industrial, and residential areas
What are the advantages of dual technology motion detectors?
Dual technology motion detectors are selectable to employ or both micro waves and inferred technologies in a single package. Selecting both technologies reduces the false alarm rate and detection sensitivity
Which type of lamps are energy efficient and have a long life span, but poor colour rendition for video surveillance system. They are often applied on streets and parking lots, and their particular quality of light enables people to see more detail at greater distances in fog?
High‐pressure sodium
Fresnel: This lighting typically projects a narrow, horizontal beam. Unlike a floodlight, which illuminates a large area, the Fresnel can be used to (a) …………………….. while leaving security personnel concealed. It is often used(b)……………………………
(a) illuminate potential intruders
(b) at the perimeters of industrial sites.
Where capacitance devices generally are used
Capacitance devices are often used with various metallic products such as safes and vaults, these devices detect changes in electrical capacitance) low voltage is applied to the protected items. If an object or person approaches or touched the protected item, the voltage (non‐harmful) discharges, altering the capacitance level and causing an alarm
Which type of lamps are more efficient than incandescent lamps but are not used extensively outdoors, except for underpasses, tunnels, and signs?
Fluorescent
Which type of lamps take several minutes to produce full light output and have poor colour rendition for video surveillance, but they have a long life?
Flourscent
Which type of lamp used at sport stadium, work well with video surveillance and can provide accurate colour rendition?
Metal halide
Which types of lamps have a long life and, similar to fluorescent lamps, are utilized mainly indoors, except for parking structures underpasses, and tunnels?
Induction lamps
Name the different types of duress/panic alarms? When these alarms should be used?
Wired switches, person‐down devices, wireless pushbutton transmitters, “Lack of Motion” devices, emergency notification call boxes, etc., are some of the device types which are employed to protect personnel by transmitting assistance alarms. These alarms should be of the highest priority level
What should be the functional requirements for a camera?
Different functions require different fields of view. For camera functional requirement one most considers three factors:
1‐ target,
2‐activity,
3‐ purpose
What are the functions of network video recorders
A NVR is an internet protocol based device that sits on a network. Because they are IP based, NVR scan be managed remotely via a LAN WAN, GAN, or over the Internet
By using which type of lens it is possible to expand or narrow the field of view providing enhanced viewing flexibility?
A motorized vari‐focal lens is used to expand or narrow the field of view providing enhanced viewing flexibility
Define time‐lapse (analog) recorder
These recorders are designed to make a two‐hour cassette record up to 900 hours by allowing‐time to lapse between recorded images. Instead of a full 25 frames (FAL) or 30frames (NTSC) of video information being recorded each second, a time‐lapse recorder may capture only a fraction as many frames. The strongest market for the time‐lapse machine is retail, industrial, and long-term surveillance.
What is the potential drawback to PTZ camera applications?
A potential drawback to PTZ camera applications is that the camera is out of position, unable to capture an event as it is happening. Most PTZ camera applications are used for assessment or video patrol purpose
Coaxial cable is generally sufficient (a)……………. , but it does not work for IP‐based systems (B)………………….
(a) for analog cameras
(b) without media transformer
Where intelligent video analytics are used?
Intelligent video analytics can used for the the recognition of certain events and conditions, such as an unattended package or vehicle, or movement by an animal versus a human being
When selecting video surveillance system equipment, it is important to use a systems approach as opposed to a components approach. What do you mean by system approach?
Approach as opposed to a components approach. A systems approach examines how equipment will work with other elements of the video surveillance system, with other workplace systems, and with the environment in which it is needed. This approach results in a video surveillance system that operates effectively and satisfies a facility’s needs
What are the elements affect the image quality?
Image quality is also affected by excessive shadows (light to dark ratio), lens glare and backlighting
What is the fundamental tool to most security officer positions
Keys.
Care should be taken to ensure that all keys are accounted for at the beginning and end of shift. Additionally, proper care should be taken so that damage to keys does not occur
What do you mean by frames per seconds
Recorders may discard image frames to save storage space. If too many are discarded – that is, if the system records only one or two frames per second then fast moving action may not be captured or items in the scene may seem simply to appear or disappear.
Explain focal length of a lens
The focal length of the lens determines the size (width and height) of the scene viewed measured in millimeters and are characterized as telephoto standard or wide angle Varifocal lenses are often used in applications that require a zoom capability. The lens’s iris, which opens and close to controls the quantity of light that reaches the camera’s sensing element, may be manual or automatic.
Name the major types of video surveillance cameras
The major types of video surveillance cameras are:
1‐ analog,
2‐IP (Internet protocol),
3‐ Infrared,
4‐ thermal.
What can greatly affect a video surveillance system budget
The availability of power can greatly affect a video surveillance system budget
What do you mean by security convergence
It is recognized that many security systems are increasingly being equipped with network connectivity to enable them to share a facility’s network infrastructure. Planning for, implementation, and management of converged security solutions often requires partnerships between physical security, IT security, IT, and other corporate or organizational stakeholders.
A concerted effort to address security issues on policy level shows ……………. and that management was aware of such issues and attempted to address them
due‐diligence
In a broad sense, (a) ………………. should be considered part of the security program. Through a (b)……………………… employees should be taught to understand the relationship between security and the organization’s success, learn their obligations under the security program, understand how various security measures support security program objectives, and become familiar with available resources to help with security concerns.
(a) every employee
(b) security awareness program
What is post orders
Post orders, which are sometimes called standard operating procedures, state the essential elements of security officers’ work assignment
What form the basis for corrective action in the event of inappropriate behavior or underperformance
Policies and procedures can also form the basis for corrective action in the event of inappropriate behavior or underperformance.
Policies are generally reviewed, approved, and issued (a) ……………………. of an organization. Once established, they tend to remain in place for an extended period. Therefore they should be aligned with the (b)…………………. of the organization.
(a) at the executive level
(b) overall business objectives
What are the differences between compliance based vulnerability assessment and performance‐ based vulnerability assessment?
Compliance‐based approaches depend on conformance to specified policies or regulations; the metric for this analysis is the presence of specified equipment and procedures. Performance‐based approaches, on the other hand, evaluate how each element of the PPS operates and what it contributes to overall system effectiveness. The use of compliance‐based (or feature‐based) systems is only effective against low threats, when assets have a low consequence of loss, or when cost‐benefit analyses show that physical protection measures are not the most cost‐effective risk management alternative. A compliance‐based analysis is easier to perform because the measure of system effectiveness is the presence of prescribed PPS equipment, procedures, and people
System effectiveness is a result of proper implementation of principles of physical security. What are these principles
System effectiveness is a result of proper implementation of these principles:
1‐Detect an adversary attack while there is still enough time to respond as desired (timely detection).,
2‐ Provide a timely and accurate assessment of alarms to separate valid intrusions from nuisance alarms.
3‐Communicate alarm information to a response force in a timely manner, or record all required information for after‐the‐event response,
4‐ Establish performance measures for each PPS function—detection, delay, and response—for each defined threat category or level.,
5‐ Ensure detection occurs before delay.,
6‐ Delay the adversary long enough for alarm recording and storage or for immediate response to interrupt the adversary,
7‐Use protection‐in‐depth (multiple layers),
8‐Ensure balanced protection.,
9‐Engage and neutralize the adversaries, using force if appropriate,
10‐Conduct path and scenario analyses, and use analysis tools to predict system effectiveness, using interruption alone, or in combination with neutralization, as the overall performance measure.
What is the difference between video surveillance and video assessment
The difference between video surveillance and video assessment was also described, the major difference being the use of sensors to trigger an event and the immediate presentation of pre‐and post‐alarm video to a human operator for immediate action
What is the best technique to objectively assess security elements and systems?
However, characterizing technology by testing to statistical standards is still the best technique to objectively assess security elements and systems
What is required to make the alarm monitoring system as effective as possible?
The alarm monitoring system must communicate sensor activation to a central monitoring point, and then appropriate data is displayed to the operator. Tight integration of technology, human factors, procedures, and training is required to make the alarm monitoring system as effective as possible.
When conducting either a qualitative or quantitative performance‐based analysis, the same six‐step process is used. What are these steps?
These are the steps used when conducting either a qualitative or quantitative performance‐based analysis,
(1)‐Create an adversary sequence diagram (ASD) for all asset locations,
(2)‐Conduct a path analysis,
(3)‐ Perform a scenario analysis,
(4)‐Complete a neutralization analysis, if appropriate,
(5)‐Determine system effectiveness,
(6)‐If system effectiveness (or risk) is not acceptable, develop and analyze upgrades.
To protect what type of asset, immediate on‐site response is required? When delay response is considered as appropriate?
An immediate on‐site response is required to protect critical assets, while a delayed response may be more appropriate for lower‐value assets.
After completion of PPS design, what is the next step?
After a PPS is designed, the next step is to evaluate the design for its effectiveness in meeting protection goals and objectives
What are the components of detection subsystem which provide notification of a potential security event?
The components of each detection subsystem combine people, procedures, and technology to provide notification of a potential security event.
What could be response strategies?
Response strategies including containment, denial, and occasionally, assault (or force) were described
When quantitative analysis of risk assessment is essential?
For assets with unacceptably high consequence of loss, it is necessary to conduct a rigorous quantitative analysis, even if the probability of attack is low.
What is the key principle of PPS analysis?
A key principle of analysis is that an initial baseline must first be established; upgrades are then considered if the baseline shows that the PPS does not meet goals and objectives.
How to define interruption?
Interruption is defined as arrival of responders at a deployed location to halt adversary progress
What do you understand by response storyboard?
Creation of a response storyboard allows the analyst and tactical experts to get a sense of how long it will take for the response force to fully engage with the adversary and what tactics are appropriate at different stages of the attack and response. Often, the response storyboard is used for neutralization analysis and scenario development
What is adversary path?
An adversary path is an ordered series of actions against a facility, which, if completed, results in successful theft, sabotage, or other malevolent outcome.
Why an adversary sequence diagram is used?
An adversary sequence diagram (ASD) is a functional representation of the PPS at a facility that is used to describe the specific protection elements present.
When neutralization analysis can be performed?
After weak paths and suitable attack scenarios have been determined, a neutralization analysis can be performed
What are the steps to be followed to conduct a scenario analysis?
The steps to conduct a scenario analysis as follows:
1‐Develop attacks and tactics designed to exploit weak paths. Consider attacks during different facility states using the defined threat and capability,
2‐Modify performance estimates for path elements using these tactics or under these states,
3‐Document the assumptions used and the results of the scenario analysis
What features should be considered while upgrading options in PPS
The upgrade options generally consider the interaction of detection, delay, and response features, as well as operational effects, life‐cycle performance‐cost trade‐offs, single‐point failures, reliability, quality, and maintenance of the security system.
Why path analysis is carried out
A path analysis determines whether a system has sufficient detection and delay to result in interruption, it is conducted first
What are the three basic steps need to be followed in creating an Adversary Sequence Diagram (ASD)?
1‐Describing the facility by separating it into adjacent physical areas,
2‐Defining protection layers and path elements between the adjacent areas,
3‐Recording detection and delay values for each path element
Why scenario analysis is required to be conducted
A scenario analysis is conducted to determine whether the system has vulnerabilities that could be exploited by adversaries using varying tactics, resulting in lower effectiveness of the PPS.
What is the key point in developing ASDs
A key point in developing ASDs is that one ASD must be created for each asset (target location), unless the assets are co‐located
What is the formula to calculate physical protection system effectiveness
In this case, physical protection system effectiveness (PE) is calculated by this formula: PE = PI x PN
What is the key objective of path analysis
The key objective of path analysis is to evaluate the PPS at a facility at a high level and determine how well protected all assets are at all times
What is the important aspect of scenario analysis
As in path analysis, an important aspect of scenario analysis is consideration of different operating states at the facility or near the asset. There are usually at least two facility states—open and closed.
Communications transmitted over copper wire in the telephone network can be intercepted at any point in the circuit. What type of tool can be used for disguising information?
A scrambler is a tool for disguising information so that it is unintelligible to those who are eavesdropping.
What are the elements in every communication, security professionals should be concerned with ?
In every communication, security professionals are concerned with the following:
1‐integrity of the communications medium (availability of the message path),
2‐integrity of the message (complete and errorless transmission of the data),
3‐ timeliness of the transmission (data communication within an appropriate time frame),
4‐message security (accessibility of the communication to authorized persons only)
Individual signals in the multiplexing process share a common transmission path but must be separated so they do not interfere with each other. What types of methods can be used?
The two methods generally used are
(1) time separation or time division multiplexing (TDM), and
(2) frequency separation or frequency division multiplexing (FDM).
What are the characteristics of alarm communication systems that drive the design?
Alarm communication systems have several characteristics that drive the design. These characteristics include the quantity of alarm data, high reliability needed for the system, and speed at which data must be delivered
What are factors should be considered while designing work area for console operator?
The work area design must consider these factors:
1‐What the operator needs to see: people, equipment, displays, and controls,
2‐What the operator needs to hear: other operators, communications equipment, and warning indicators,
3‐What the operator needs to reach and manipulate: hand or foot controls and communications equipment.
What is the overriding design philosophy for AC&D console? What are the rules a designer should follow while designing a console?
The overriding design philosophy is “operator first.” Designers should follow these rules:
1‐The number of actions required to perform a command should be minimized. For a major command, an operator should only have to click the mouse once or depress a single key,
2 Only operations that are valid in the current context should be available,
3‐ The system should guide the operator through complex operations,
4‐ Annunciator systems should not override operations in progress,
5‐Systems should not be annoying and should avoid loud, continuous alarms or bright, flashing displays,
6‐A given command should be performable in several ways. Making commands available,
7‐As menu items, buttons, and keystrokes creates a friendlier system, enabling users to select their preferred methods.
What drive alarm reporting speeds
Both human‐factor considerations and interactions between the AC&D and assessment systems drive alarm reporting speeds
What is the major advantage of private automatic board exchange (PABX)?
A wireless private automatic board exchange (PABX) uses a low‐power transmitter to communicate with handheld telephones within a limited range. The major advantage is that two‐way communication can be established with an employee whose duties require roaming throughout the facility
How the range of the microwave system can be extended? When microwave can be cost‐effect in electronic protection system?
A repeater also can be used to extend the range of the microwave system. Where short distances are involved, microwave can be cost‐effective in electronic protection systems
What is multiplexing?
Multiplexing is a technique to transmit several messages simultaneously on the same medium. A multiplex installation can be more cost‐ effective than a loop or point‐to‐point installation, as multiple signals are transmitted over longer distances to a control center.
How a measure of security can be added in digital cellular systems
As in digital cellular systems, the signal can be intercepted using a receiver tuned to the transmission frequency. The use of transmission compression technology, such as TDMA, adds a measure of security to the system.
While designing the alarm display console (the operator’s console), what are the concerns that needs to be addressed?
The alarm display equipment (the operator’s console) receives information from alarm sensors. Several concerns must be addressed in console design:
1‐what information is shown to the operator,
2‐ how it is presented,
3‐how the operator communicates with the system,
4‐how to arrange the equipment at the operator’s workstation.
What are the methods of line security may be taken to ensure where the value of the assets being protected or the information being transmitted is high?
Where the value of the assets being protected or the information being transmitted is high, other methods of line security may be required, such as these:
1‐minimizing the permissible variance in circuit value,
2‐using quasi‐random pulses, which must be recognized by the control equipment,
3‐using shifts in the transmission frequency.
What is difference between frequency modulator scramblers and phase modulator scramblers
Frequency modulator scramblers cause the voice spectrum to be inverted and continuously changed in frequency in accordance with a predetermined pattern. Phase modulators operate in a similar manner, but it is the phase rather than the frequency of the voice wave that is changed. These devices are similar to a rolling band splitter but usually have a higher level of security since the pattern can be changed more frequently
What is masking
Masking is a technique for modifying the amplitude of the voice by adding another signal into the voice band. This masking signal is removed at the receiving unit to restore the original voice. The mask may be a single tone, a combination of switched tones, or RF noise. This is a very effective technique for destroying some syllabic content of the voice. Used alone, its security is not very good because a clear voice can be read through the mask fairly easily. Used in conjunction with a band splitter or frequency or phase modulator, masking provides a high degree of security.
What is the goal of the AC&D subsystem
The subsystem’s goal is to support the rapid evaluation of alarms
The control and display subsystem should be designed to serve what
The control and display subsystem should be designed to serve the human operator.
How it is possible to create an environment suitable for console operator to work effectively and reduces frustration and fatigue
Ensuring normal temperature, humidity, noise, and general comfort factors creates an environment suitable for operator effectiveness and reduces frustration and fatigue
What is band splitter
Band splitters are extensions of the frequency inverter, in which the single speech band is broken up into a number of smaller frequency bands. These bands are inverted and interchanged prior to transmission . A five‐band band splitter theoretically may scramble the frequency bands in exactly 3,080 different ways, of which 90 percent provide no better security than a frequency inverter. A trained listener can obtain a surprising amount of information by listening to the scrambled transmission
What can be used to distinguish classes of alarms
Different pitches and volumes can be used to distinguish classes of alarms, such as security, safety, or maintenance
Where displays should be installed in the console
Displays are usually installed in the center of the console, with readily identifiable controls placed on, below, or around the displays
How it is possible to improve the display of security alarm information
Well‐designed graphical user interfaces (GUIS) can improve the display of security alarm information, and poorly designed GUIs can quickly overwhelm an operator
What is the difference between time division multiplexing and frequency division multiplexing?
With TDM, each sensor or data source is assigned a time segment and each may transmit only during its assigned segment. In FDM, signals from a number of sensors on a common transmission line occupy different portions of the frequency spectrum. Even though transmitted simultaneously, their different frequencies keep them individually identifiable at the receiver
What is fundamental to the performance of the response function?
Staffing of the response force is fundamental to the performance of the response function
What is an important part of a facility’s ability to successfully resolve an incident?
Contingency planning is an important part of a facility’s ability to successfully resolve an incident
What is a critical part of the design and analysis process of a PPS
A critical part of the design and analysis process of a PPS is the identification of assets
What is a key factor in the interaction between facility personnel and other agencies?
Communication will be a key factor in the interaction between facility personnel and other agencies
Depending on what factors the response force of a particular facility decide either prevents
Depending on the threat, consequence of loss of the asset, and the particular facility, the response force must either prevent adversaries from accomplishing their objective or work to recover the asset
What helps a facility manager identify potential targets, respond to different threats, interact with outside agencies, and determine what level of force guards can use in various situations?
Prior planning helps a facility manager identify potential targets, respond to different threats, interact with outside agencies, and determine what level of force guards can use in various situations.
When it can be considered that a denial strategy expected to be successful?
It should be apparent that for a denial strategy to be successful, the response force must be present at the location and time of the sabotage or attack
When containment strategy can be used?
Containment is the strategy used against an adversary with theft as the goal.
What may reveal weaknesses in the security protection at a facility and provide an opportunity to improve asset protection?
Abnormal conditions may reveal weaknesses in the security protection at a facility and provide an opportunity to improve asset protection
What is the key to effective guard regardless of which type of guard force?
Regardless of which type of guard force is used at a facility, the key to effective guard use is training
When a denial strategy may be used
A denial strategy is used when the adversary goal is sabotage or violent attack
On what elements interruption depends
Interruption depends on reliable, accurate, fast alarm reporting and assessment, along with reliable communication and effective deployment to the proper location.
Based on the adversary goal and the consequence of loss of the asset, different response force strategies will be used. Name the types of strategies are used?
Based on the adversary goal and the consequence of loss of the asset, different response force strategies will be used. These strategies include containment, denial, and occasionally assault
What is major part of contingency planning?
Well‐documented procedures should be developed in advance as a major part of contingency planning.
What are the primary uses of video surveillance systems
Detection, recording, and assessment
Which of the following is NOT one of the systems design processes
Delivery and maintenance
Which of the following drawing types are chart-like representations of complete subsystems, such as CCTV or access control?
Riser
In general, how much more light do color cameras require than black and white cameras?
Twice as much
The quality of assets protection is a direct function of _________ and ____________.
Local training and supervision
An entry control subsystem is part of the…
Detection system
Of the three main characteristics of intrusion sensor performance, which of the following is NOT one?
False Alarm Rate (FAR)
Interior application sensors are divided into three categories. Which of the following is NOT one of these categories?
Perimeter sensing
When selecting a video system, use a ________ approach instead of a components approach
System
What are the two classes of locks
Mechanical and electromechanical
Which of the following is NOT one of the biggest causes of vulnerabilities in a Physical Protection System (PPS)?
Improper repair
An effective PPS combines the following into an integrated system
People, technology, and procedures
CPTED is the design or redesign of a venue to reduce crime opportunity and fear of crime through what three methods?
Natural, mechanical, and organizational means
What are the three main components of an analog video system?
Camera, transmission cable, and monitor
Which camera can see in perfect darkness with no light source?
Thermal imaging
Which type of system test is conducted in alternating phases of testing and evaluation to allow for validation of the tests and corrective actions?
Reliability or availability tests
What is the most important measure of an Alarm Communication and Display (AC&D) system?
How well it quickly and clearly communicates alarm data from sensors to the system operator
A security officer post is any location or combination of activities for which a trained human being is necessary. Which of the following is NOT one of the three key concepts of this approach?
Necessary equipment
The efficiency of the security force depends on…
The adequacy and skill of its supervisors
Which camera can see in perfect darkness but requires a light source outside the visible spectrum?
IR
What are the three main components of a digital video system?
Camera, digital transmission medium, and PC/software
Safes less than what weight are considered “portable?
750 lbs
The process of assessing security-related risks from internal and external threats to an entity, its assets, and its personnel is called a
Risk Assessment
A weakness or organizational practice that may facilitate or allow a threat to be implemented or increase the magnitude of a loss event”, is a definition of which of the following?
Vulnerability
This detector absorbs invisible light energy comparing actual energy to established background energy. What type of detector is this?
Passive Infrared
There is a serious threat to security and fear of attack in a college, what security measures would be necessary to address that situation
Design and redesign space to encourage activity and witness potentials by legitimate users
In an account department, what would be the best practice to ensure proper accounting practices
Adopt a two persons rule/separation of duties
Which sensor is designed to detect a change in capacitive coupling among a set of wires attached to an object
Capacitance
A colour rendition index of 70 to 80 is considered what
Good
When you decide to keep a critical asset of the company at a remote location, what is this called
Risk Spreading
What is the technique of transmitting several messages simultaneously on the same medium called
Multiplexing
Disguising information so that it is unintelligible to protect proprietary information is called
Scrambling
When preparing an initial budget, what percentage of the final bid price is generally allowed as a margin of error
15-20 percent
What requires a sufficient amplitude change and duration to cause an alarm in a microwave
Doppler principle
The reliability of this locks accounts for its popularity, which lock is being referred
Pin tumbler locks
Gathering information on the layout of the facility, the location of key assets, facility operations and production capability and location types of PPS components by the VA team is referred to as what
Facility characterization
A logical method of problem solving in which a comprehensive solution is developed in relation to a problem having several dimensions is a definition of
System approach
What is the recommended spacing distance between pillars in a chain link fencing
10 feet
Access delay barriers may take which forms
Passive barriers
Security officers
Dispensable barriers
How many trials combinations can a four digits PIN allow
10000
For resolution that is clearer and can see larger range of colours and high sensitivity what would be best recommended for observation or assessment
Digital cameras
What is a major difference between emergency lights and other forms of lights
It has alternative power source
Which type of lighting would best serve for video surveillance if colour rendition is a major consideration
Metal halide
The verification that a PPS component is able to do what it is expected to and is suitable for the use it is selected is called
Validate
An alarm that terminates at police or the headquarters is called
Auxiliary alarm
Which type of structural barriers is best in providing an extended penetration delay even after an explosive attack
Thick reinforced concrete
Testing a PPS component to verify whether the device is on and performing as expected is called
Functional testing
Which are the HID family of lamps
Metal halide
Mercury vapour
High pressure sodium
A line transmission technique in which the installation is connected directly to a control by a pair of wires is referred to as what
Point-to-point
A wire alarm system designed to check the circuit automatically and immediately signal a fault on the circuit is known as
Line Supervision
The designer always considers expansion capacity of the design from the very beginning, what is typically the range added in percentage
10-15 percent
A good design always strikes a balance between what
Quality components and cost
Two of the main cost drivers for security design are the design fees and what else
Projected system construction cost
When events are independent of each other, the probability of their, simultaneous occurrence is the product of their separate probabilities, is known as what
Redundant security scheme
For security professionals, CPTED is a set of management tools targeting what
Places
Behaviour
Design and use of space
The ability of design to counteract the perception that the area is isolated and criminally vulnerable is known as
Image and milieu
The quantity of light emitted by a lamp is measured in what
Lumen
To show the displays from several cameras on one or more monitors, what does a system generally require
Switcher
The principal security strategies identified by most security designers as the important functional requirements of a security design are
Prevention
Detection
Control
The biggest mistake made when conducting a vulnerability assessment is
Concentrating on individual PPS components and addressing upgrades only on that level, not of the overall system level
CPTED solution follow which methods
Natural access control
Natural surveillance
Natural territorial reinforcement
After analysing facility data and vulnerabilities and the VA report is written, what is the next response
Baseline risk is determined
If a light burns for 15,000hrs, how much lumen per watts is its efficacy
150 watts
The general purpose of undertaking a vulnerability assessment is
To establish a baseline of the PPS effectiveness in meeting goals and objectives
Any delay before detection serves primarily as what
Deterrence
The amount of protection required by any asset within an organization is a function of which of the following
The value of the asset and the risk tolerance of the enterprise
Response force personnel if deployed in a fixed and well protected position are considered what element of the PPS
Delay
What is the sole purposes of using locks in security applications
Eliminate the need of posting guards to every access point
Serves as a method of controlling physical access
As a delay mechanism
What are major determinants of a security system solutions
Capacity
Size
Space requirements
What is used to detect any attack or defeat on communication lines
Line supervision
What is associated with immediate image capture with a sensor alarm to determine the response
Assessment system
Rings or layers in an assets safe guide in relation to protection-in-depth is referred to as
Redundant security scheme
List what are HID family of light
Metal halide
High pressure sodium
Mercury vapour
At what point should future expansion be considered in the design of the PPS
At the site selection
A rational and orderly approach as well as a comprehensive solution to problem identification and probability determination is
Risk assessment
The percentage of light reflected from a surface is referred to as
Reflectance
The principle strategy considered as the most important functional requirements of a security design are
Prevention
Detection
Control
What is referred to as time period a switcher automatically switches from camera to camera
Dwell-time
What is referred to as the dividing of video images into grid selections
Masking
The most common type of sensors generally installed on doors and windows is
Simple switch
The concentration of light over a particular area is called
Illuminance
Which are an integral parts of a mechanical lock
Bolt or latch
Tumbler array
Key
Which locks greatest weakness is its vulnerability to spring manipulation due to corrosion, weathering and age
Warded
If an area required to be illuminated by a light level of 55FC (foot candle) what is the equivalent in lux
550 lux
Verification decision for personnel entry control is usually based on the determination of what concepts
What you have
What you know
What you are
Which is the most widely used encoded card used in commercial credit card system
Magnetic stripe
What is the main advantage of the smart card is
Has large memory and high degree of resistance to compromise
Which of the following is an easy going entry control card technology
Proximity card
The first phase of the implementation PPS is planning and
Assessment
From an eavesdropper perspective which of the following are popular means to obtain information from a phone line
Inductive/direct coupling
What are the types of metal detectors
Passive/active
A good design always strikes a balance between which two factors
Quality components and overall cost
Systems in PPS designs will be evaluated on which parameters
Quality
Reliability
Cost
What determines how security is designed, defined and implemented in an organization
Organizational culture
The first task of the first phase in the design and implementation of the PPS includes what
Identification of critical assets
Potential threats
Functional requirements
A significant factor in the design and implementation of security system and programs is
Corporate culture
Along with specification which of the following is the cornerstone of any construction project
Drawings
What in security system shows a top-down, map-like view of an area where security devices and system
Plan
Considering the operation of the PPS which of the following drives the system design
Security programs need to have minimum negative impact on productivity
Security programs as a source of convenience to employees
An organization is constantly experiencing break-ins, with most of it targeted at night, which sensor type would be the best recommendation to address this issues
Vibration
A safe used to store records what would be a major interior constituents
Scientifically insulated
Moisture incorporation
Reinforced steel
A type of alarm transmission installation which involves devices being installed on a pair of wires throughout an area on facility, and then connected to a control centre is
Loop
The measure of effectiveness of entry control is
Thorough put
False acceptance rate
False rejection rate
The final size of the viewing area as measured in width and height is referred to as
Field of view
Resolution of a digital camera is measured in terms of what
Common intermediate format
Which sensor causes an alarm when an intruder is made to go either towards or away from the field of view
Microwave
A detailed in-depth examination of all revealing security defences and defensive activity, measured against current and projected risk is
Security survey
Which are the primary function of the PPS
Detection
Delay
Response
What is VSAT
Vulnerability self assessment tool
List lights that have instant re-strike
Incandescent
Halogen
Fluorescent
Sensors are generally categorized into which classes
Perimeter,
Space,
Object
What views shows vertical surfaces and mounting heights and locations of security devices in a security design document
Elevation drawings
A type of procurement method recommended where the security owner has the capability to perform the security needs analysis and has a good prior knowledge of systems and prices is
Invitation for bids
A type of procurement where the security manager knows the requirements and specification the system to meet but does not have any knowledge of the equipment or how it will be met is
Request for proposal
What is the required height of an impact drop test for a safe
30 ft
Which concept is generally applied when applying CPTED measures
Natural access control
Natural surveillance
Natural territoriality
An alarm caused due to an equipment failure is
False alarm
The human perception of the amount of light that reaches the eye is referred to as what
Brightness
As a general rule what are the lighting levels for detection, recognition and identification listed in sequence
0.5FC, 1.0FC, 2.0FC
Which lamps requires time to reach full output especially in cold weather
Fluorescence
Which are the advantages of smart card over proximity card
Large memory
High degree resistance to forgery
Low degree of compromise
For security and safety reasons what should be the recommended distance between a door and window
40 inch
A before the incident preparation for an after-the-incident continuation of business refers to what
Risk management
A method of identifying the weak points of a facility is
Vulnerability analysis
The most common interior motion sensor is
PIR
What is the most common type of sensor generally installed on doors and windows
Simple switch
What testing repeats a given test enough times to establish a measure of device capability against different threats
Performance testing
What is the major goal of vulnerability assessment
Identify PPS components in the functional area of detection, delay and response
The use of multiple lines of detection is referred to as
Protection-in-depth
The second most important decision in the application of CCTV in an asset protection program is
Choice of lens
If a camera is mounted on the site of a building 40ft from the ground and the centre of the scene to be watched is 30ft from the building. What would be the distance from the camera to the scene
50 ft
The output of the first phase of the design and evaluation process of the PPS is
Threat spectrum
The first phase of the design and evaluation process is
Determining system goals and objectives
When the failure of a primary structural element results in the failure of adjoining structural element, this is
Progressive collapse
What describes the action of the response force from the time it receives a communication until it is in position to interrupt the adversary
Deployment
An analysis approach which evaluates how each element of the PPS operates and its contribution to the overall system effectiveness is referred to
Performance based analysis
The key distinction between safety and security is
Their cause
In risk analysis, reducing consequences given the event is called
Mitigation
After assessment of vulnerability, and the implementation of countermeasures what is next
Evaluation/Review of effectiveness
An uncertain situation in which a number of possible outcome might occur, one or more of which is undesirable describes what
Risk
What type of analysis would be most appropriate for a petro-chemical industrial location
Quantitative
The statement ‘‘volumetric sensor shall detect an individual moving at a rate of 1 foot per second’’ or faster within a total field of view of the sensor ‘‘is an example of what
Performance based criteria
What type of sensors is recommended for deployment in an environment with explosive vapour materials
Passive
When installing a glass break sensor what is a major consideration
Installed directly opposite the protected glass
A technique that allows the target to pass through the sensor’s normal detection zone without generating an alarm is
Spoofing
When two sensors are logically combined, the probability of detection of the combined detectors is what
Is less than the probability of detection of the individual detector
In designing a CCTV application, for an asset protection program, security manager should keep what in mind
CCTV is a visual tool of security and should be applied accordingly
The application should dictate the equipment
No matter what, the equipment of the system will become obsolete
If a system is obsolete but still performing it is because the original application was correctly designed
What is the correct sequence of choosing cameras
Sensitivity, resolution and features
The three theoretical identification views of a CCTV system are
Subject identification
Action identification
Scene identification
When a master key is lost, what is the recommended key replacement approach
Replace from outer perimeter first
What is the most common reason for using mechanical locks and key
Eliminate the need for posting guards to every access
Used for restricting access to corporate and institutional facilities/ assets
As a delay mechanism
Fire resistance document safes are designated in what way
350-1
350-4
350-2
An alarm that goes to the fire and police station is
Auxiliary alarm
List what are external security lighting
Search light
Frensel
Street light
Flood light
What light is good for video surveillance
Incandescent
Which sensor is used to protect filling cabinets and safes
Capacitance
Which surfaces have the highest reflectance
Snow
When bid prices have been considered for a project, which drawing in particular does contractors use for device count
Riser drawings
Which alarm operates from residential location with guards in charge
Proprietary alarm
What sensor operates with the adversary body temperature
PIR
Marquis-de-Laplace’s formula of probability can be referred to as what
Redundant scheme
The process of combining technology elements, procedures and personnel into a single system for providing security at a facility is
System integration
What is the most used sensor for intrusion protection
Vibration sensors
Electromechanical sensors
Which alarm is a result of equipment failure
False alarm
Which sensor provides early warning for a forced entry
Vibration
What advantage does stored image badge have over manual photo I.D system
Difficult to tamper with stored image as it’s comparable to badge exchange
In lock, the concept of what you have, what you know, and what you are is in relation to what
Personal entry control
What is the distance of the outer perimeter fence to the structure inside, if the building itself forms part of the perimeter
2 inch
What is the distance of the outer perimeter fence to the structure inside, if the building itself is not part of the perimeter
50 feet/600 inch
What type of light is a metal halide
HID light
What sensor will cause an alarm on an intruder who absorbs some of electrical energy upon touching the protected object
Capacitance
For the purpose of bomb blast on a perimeter, what type of wall is best suited to resist the blast
Thick reinforced concrete
Which sensor will detect an intruder in the area immediately adjacent to an object being protected in an interior area
Proximity
Access delay barriers are passive barriers security officers and what else
Dispensable barriers
What is the most integral instrument in conducting a site survey
Checklist
The parts of the overall risk management process are
Threat
Asset value
Vulnerability
Which sensor can be applied by a security manager to handle frequent reports of stolen haulage items in a distant location
Radio frequency wireless sensor system/IDS
What is the quantity of light emitted by a household bulb rated 100wats
1700 Lumen
What sensor determines if there is a change in temperature by human presence in a place
PIR
A sensor that achieves absolute alarm confirmation by combining two technologies is
Dual technology
Which sensor will be inappropriate in a building in which walls are made of gypsum plastic plywood
Microwave
When events are independent of each other the probability is the product of their simultaneous occurrence is the product of their separate probabilities is whose principle
Marquis de-Laplace
On a large facility where there are multiple alarm sensors deployed and where alarms terminates at a location outside the facility is which type of alarm transmission
Central alarm
Which magnetic stripe medium that is mostly used in security credential application
2,500-4000 Oersted
UL standard requires that safes of what weight be anchored on the structure
750 Ibs
How long does a fire resistant safe keeps its rated value
20 to 30 yrs depending on climate
What does a record typically incorporate in its insulation to help dissipate a fire’s heat in the interior
Moisture
What is the lifeblood of every organization
Records
Which types of safes rating are recommended for magnetic media protection
150-1
The principal U.S standard for fire-resistant vaults is
NFPA
In the U.S standard for safes for the storage of government classified information is defined by who
GSA
The key to an effective guard use is
Training
The strategy used against an adversary with theft as the final goal is
Containment
A critical part of the design and analysis process of the PPS is
Identification of assets
What strategy is recommended when an adversary goal is sabotage or violent attack
Denial
The primary functions of the PPS are
Detection
Delay
Response
Which type of analysis would be more appropriate for, retail stores, apartment buildings and small businesses
Qualitative
What type of analysis approach depends on conformance to specific policies and regulation for which the metrics is the presence of specified equipments and procedures
Compliance based
What is a multi-step process to subjectively evaluate an asset as a target for attack by adversary, form an adversary’s perspective
CARVER
A fully integrated security program blends which elements into a responsive system
Architectural
Technological
Operational
Which are particularly important factors in the design of an integrated security system to pin point the best solution
Anticipated threats/Vulnerability
Needs of the facility
Constraints
A protective system is evaluated on the performance and cost effectiveness of individual measures in doing what
Countering threats
Reducing vulnerabilities
Decreasing risk exposure
A combination of equipment’s, personnel and procedures coordinated and designed to ensure optimum achievement of the system stated objectives is referred to as
System
The last task of the planning and assessment process is
Design concept
What constitutes the ground rules and guidelines for the PPS design
Design criteria
Visual evidence of a comprehensive security program will induce some perpetrators to look for other facilities where access would be less risky principle is also referred to as:
Deter access
To be effective, the design and implementation of an assets protection program incorporates an orderly method of problem solving that should ensure a sound security program is developed. This is called the:
Systems approach
Physical security barriers are typically arranged in concentric layer, with the level of security growing progressively higher as one approaches the centre. This principle is also referred to as:
Redundant security scheme
In the discussion on basic concepts of risk management, what does the term dynamic risk mean?
Any situation that carries the potential for both benefit and cost or loss
When discussing safes, the underwriters laboratories Inc. symbol ‘‘TRTL’’ indicates:
Safe is resistant to both torches and tools
The mechanical lock longest in use and has practically no security value is
The warded lock
This SMNA designation for a record safe would indicate paper would be protected for 4-hours if inside this safe in a fire
350 Degrees -4 hours
Security tools used by the crime prevention manager are the 5‘‘D’s’’ of crime prevention
A six 6-foot (1.8 meter) chain-link fence with a method of alarming and verifying the alarm with CCTV when someone penetrates the barrier is an example of:
Deter and detect
There are only three reasons for having cameras in security applications, they are:
To obtain visual information about something that is happening
To obtain information about something that happened
To deter undesirable activities.
Three major components of a CCTV system are:
Camera,
Cable,
Monitors
The three D’s of CPTED are known as, _____________ definition and delay
Designation
While establishing a probability rating during a vulnerability analysis, a particular rating is in doubt after all the information is gathered and evaluated. Which of the following measures should be taken?
Assign the higher of two possible ratings.
In the equation P=f/n, P means
Probability
This is commonly referred to as a sound wave sensor
Ultrasonic detector
Three Classifications when practicing CPTED: are Mechanical measures, human and/or organizational measures and:
Natural measures
Annualized loss expectancy, also known as expected loss, is determined by:
Vulnerabilities,
Loss Potentials, and
Threats
A top guard is an overhang of barbed wire or barbed tape along the top of the fence facing outward (Sometimes inward) and recommended to be a minimum specification of:
Three strands of wire and 45 degree angle
In a situation there is air turbulence caused by air condition and there is frequent activity adjacent to the protected area. The walls of the protected area. Are solid concrete. Which combination of motion sensors may be used to reduce or virtually eliminate false alarms?
Dual technology
When project managing the implementation of a new security technology, unless the security manager has an intimate and detailed knowledge of exactly the equipment or model, he/she will require which of the following instruments to procure it
Request for proposal
What is the first and most important output of the planning and assessment phase of any security design process?
Basis of design