Physical Security Flashcards
What are the two primary purposes of a physical security program?
Prevention and Protection
What is the ATWG?
Antiterrorism Working Group
Responsible for assessing requirements for physical security;
recommending and developing policy;
preparing planning documents, and;
conducting criticality, vulnerability, and risk assessments.
What is the ATEC?
Antiterrorism Executive Committee
Develops and refines antiterrorism program guidance, policy, and standards.
Acts upon recommendations of the Antiterrorism Working Group and Threat Working Group.
What is the ISO?
Information System Owner
Responsible for the security of information systems.
Develops contingency plans for the protection of the information systems.
What is the TWG and who is in it?
Threat Working Group. This group is comprised of an: 1) Antiterrorism Officer 2) CI representative 3) Law enforcement representative 4) OPSEC officer 5) Information operations representative 6) Chemical, biological, radiological, nuclear, and high yield explosive representative.
Name 3 of the 6 key individuals associated with a physical security program.
1) Installation Commander/Facility Director
2) Antiterrorism Officer
3) CI Support Personnel
4) Law Enforcement Officials
5) Operations Security (OPSEC) Officer
6) Physical Security Officer
How is Site Design important in creating a physical security program?
Properly designed facilities provide a physical and psychological deterrence to intruders. Poor facility design can also make a facility a possible target for intruders.
List 3 ways you would station Security Forces.
1) Access control points
2) Static observation posts
3) Roving patrols
4) Response forces
5) Security systems monitors
6) Dispatch and control centers
7) Escorts
What is the purpose of an IDS?
To deter, detect, document, and deny or delay intrusion.
List 2 Physical Security Systems.
IDS ACS Closed Circuit TV Screening Equipment 2-Way Radios
How would you determine which type of access control system to install?
Based on risk management: defining the criticality, vulnerability, and the threat to DoD assets.
In a Physical Security Program, what is a CAC an example of?
Access Control
What should you know about your keys?
At a minimum, lock and key control procedures should include a key register to list keys, document their issuance, return, and/or disposition.
Another control measure would be to have a list of personnel who are authorized access to keys and key records.
What are the levels FPCONs?
FPCON NORMAL applies when a general global threat of possible terrorist activity exists and warrants a routine security posture.
FPCON ALPHA applies when there is an increased general threat of possible terrorist activity against personnel or facilities; the nature and extent of which are unpredictable.
FPCON BRAVO indicates an increased or more predictable threat of terrorist activity exists.
FPCON CHARLIE applies when an incident occurs or intelligence is received indicating some form of terrorist action or terrorist targeting against U.S. personnel or DoD assets is likely.
FPCON DELTA applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is imminent.
What is the purpose of a security inspection?
Verify policy compliance, promote cost effective security, serve as an opportunity for security education, establish and/or enhance good working relationships, identify existing or potential program weaknesses, and promote quality performance of security functions.