physical security Flashcards

1
Q

Facilitating method to implement a course of action. (A capability may or
may not be accompanied by an intention).

A

Capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Controlled Area

A

A controlled space extending upward and outward from a specified
point. This area is typically designated by a commander or director, wherein sensitive
information or operations occur and requires limitations of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Critical Communications Facility

A

A communications facility that is essential to the
continuity of operations of the President or Secretary of Defense during national emergencies,
and other nodal points or elements designated as crucial to mission accomplishment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Electronic Security Systems (ESS).

A

That part of physical security concerned with the
safeguarding of personnel and property by use of electronic systems. These systems include, but
are not limited to, intrusion detection systems (IDS), automated entry control systems (AECS),
and video assessment systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Installations

A

Real DoD properties including bases, stations, forts (including National
Guard and Federal Reserve Centers), depots, arsenals, plants (both contractor and Government
operated), hospitals, terminals, and other special mission facilities, as well as those used
primarily for military purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Personnel Identity Management and Protection

A

A business process that validates,
authenticates and secures an individual’s identity. The process includes: identity vetting; a
binding of the identity to an identity protection and management system through the issuance of
a DoD credential; the linkage of the Personal Identity Verification (PIV) credential to the
individual through the use of uniquely identifying characteristics and a personal identification
number; and digital authentication of the identification credential linkage to the individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Resources

A

Personnel and/or materials provided as a means of support (does not refer
to monetary source for purposes of this guidance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Restricted Area

A

An area (land, sea or air) in which there are special restrictive
measures employed to prevent or minimize incursions and/or interference, where special security
measures are employed to prevent unauthorized entry. Restricted areas may be of different types
depending on the nature and varying degree of importance of the security interest, or other matter
contained therein. Restricted areas must be authorized by the installation/activity
commander/director, properly posted, and shall employ physical security measures.
Additionally, Controlled Areas may be established adjacent to Restricted Areas for verification
and authentication of personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk

A

A measure of consequence of peril, hazard or loss, which is incurred from a
capable aggressor or the environment (the presence of a threat and unmitigated vulnerability).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Assessment

A

A defined process used to fuse the procedures of analyzing threat,
risks, and vulnerabilities, into a cohesive, actionable product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Management

A

Process and resultant risk of systematically identifying, assessing
and controlling risks. Commanders/Directors are required to identify critical assets and their
subsequent protection requirements, including future expenditures required for the protection
requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Survivability

A

The ability to withstand or repel attack, or other hostile action, to the
extent that essential functions can continue or be resumed after onset of hostile action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security-in-Depth

A

A determination by the senior agency official that a
facility’s security program consists of layered and complimentary security controls sufficient to
deter, detect, and document unauthorized entry and movement within the facility. Examples
include the use of perimeter fences, employee and visitor access controls, use of an intrusion
detection system, random guard patrols throughout the facility during non-working and working
hours, and closed circuit video monitoring or other safeguards that mitigate the vulnerability of
unalarmed storage areas and security storage cabinets during non-working hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The perceived imminence of intended aggression by a capable entity to harm a
nation, a government or its instrumentalities, such as intelligence, programs, operations, people,
installations, or facilities.

A

Threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat Analysis

A

The continual process of compiling and examining all available
information concerning the capability, activity, and intention of potential aggressors, which
supports the deployment and degree of countermeasure requirements to address the perceived
threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat Assessment

A

A resultant product of the defined process used to conduct a threat
analysis and develop an evaluation of a potential threat. Also, it is the product of a threat
analysis for a particular unit, installation, or activity.

17
Q

Vulnerability

A

A situation or circumstance, which left unchanged, may result in the
degradation, loss of life, or damage to mission-essential resources.

18
Q

Vulnerability Assessment

A

comprehensive evaluation of an installation, facility, or
activity to determine preparedness to deter, withstand, and /or recover from the full range of
adversarial capabilities based on the threat assessment, compliance with protection standards,
and risk management.