physical security Flashcards
Facilitating method to implement a course of action. (A capability may or
may not be accompanied by an intention).
Capability
Controlled Area
A controlled space extending upward and outward from a specified
point. This area is typically designated by a commander or director, wherein sensitive
information or operations occur and requires limitations of access
Critical Communications Facility
A communications facility that is essential to the
continuity of operations of the President or Secretary of Defense during national emergencies,
and other nodal points or elements designated as crucial to mission accomplishment
Electronic Security Systems (ESS).
That part of physical security concerned with the
safeguarding of personnel and property by use of electronic systems. These systems include, but
are not limited to, intrusion detection systems (IDS), automated entry control systems (AECS),
and video assessment systems.
Installations
Real DoD properties including bases, stations, forts (including National
Guard and Federal Reserve Centers), depots, arsenals, plants (both contractor and Government
operated), hospitals, terminals, and other special mission facilities, as well as those used
primarily for military purposes.
Personnel Identity Management and Protection
A business process that validates,
authenticates and secures an individual’s identity. The process includes: identity vetting; a
binding of the identity to an identity protection and management system through the issuance of
a DoD credential; the linkage of the Personal Identity Verification (PIV) credential to the
individual through the use of uniquely identifying characteristics and a personal identification
number; and digital authentication of the identification credential linkage to the individual
Resources
Personnel and/or materials provided as a means of support (does not refer
to monetary source for purposes of this guidance)
Restricted Area
An area (land, sea or air) in which there are special restrictive
measures employed to prevent or minimize incursions and/or interference, where special security
measures are employed to prevent unauthorized entry. Restricted areas may be of different types
depending on the nature and varying degree of importance of the security interest, or other matter
contained therein. Restricted areas must be authorized by the installation/activity
commander/director, properly posted, and shall employ physical security measures.
Additionally, Controlled Areas may be established adjacent to Restricted Areas for verification
and authentication of personnel.
Risk
A measure of consequence of peril, hazard or loss, which is incurred from a
capable aggressor or the environment (the presence of a threat and unmitigated vulnerability).
Risk Assessment
A defined process used to fuse the procedures of analyzing threat,
risks, and vulnerabilities, into a cohesive, actionable product
Risk Management
Process and resultant risk of systematically identifying, assessing
and controlling risks. Commanders/Directors are required to identify critical assets and their
subsequent protection requirements, including future expenditures required for the protection
requirements.
Survivability
The ability to withstand or repel attack, or other hostile action, to the
extent that essential functions can continue or be resumed after onset of hostile action.
Security-in-Depth
A determination by the senior agency official that a
facility’s security program consists of layered and complimentary security controls sufficient to
deter, detect, and document unauthorized entry and movement within the facility. Examples
include the use of perimeter fences, employee and visitor access controls, use of an intrusion
detection system, random guard patrols throughout the facility during non-working and working
hours, and closed circuit video monitoring or other safeguards that mitigate the vulnerability of
unalarmed storage areas and security storage cabinets during non-working hours.
The perceived imminence of intended aggression by a capable entity to harm a
nation, a government or its instrumentalities, such as intelligence, programs, operations, people,
installations, or facilities.
Threat.
Threat Analysis
The continual process of compiling and examining all available
information concerning the capability, activity, and intention of potential aggressors, which
supports the deployment and degree of countermeasure requirements to address the perceived
threat.