Physical Security 5 Flashcards

1
Q

What is the purpose of a security survey?

A
  1. Determine and document the current security posture
  2. Identify deficiencies and excesses in existing security measures
  3. Compare the current posture with a determination of the appropriate level of security or protection needed
  4. Recommend improvements in the overall situation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three physical security assessment methodologies?

A
  1. Outside-Inward Methodology
  2. Inside-Outward Methodology
  3. Functional Methodology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are typical areas, items, and issues to consider when conducting a physical security survey?

A
  1. Barriers
  2. Doors, windows, and other openings
  3. Locks
  4. Safes and containers
  5. Signage
  6. Lighting
  7. Alarm and electronic security systems
  8. Security officer services
  9. Vehicle, traffic, and parking controls
  10. Protection of utilities
  11. Visitor management
  12. Package and mail handling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How should areas and items be assessed during a physical security survey?

A

In terms of appropriateness for the situation, age, operability, maintenance, interoperability, aesthetics, and consistency with the current use of the space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are four tests that should be conducted as part of a physical security survey?

A
  1. Shipping and receiving
  2. Alarms
  3. Computer/server room security
  4. General access controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are five criteria of good physical security survey reports?

A
  1. Accuracy
  2. Clarity
  3. Conciseness
  4. Timeliness
  5. Slant or pitch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two foundational principles of physical security design?

A
  1. Four Ds
  2. Layered security or defense-in-depth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the Four Ds?

A
  1. Deter
  2. Detect
  3. Delay
  4. Deny
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a defense-in-depth approach?

A

An adversary must avoid or defeat a number of protective devices or features in sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between point and area security?

A

Area security features a significant perimeter protection and entry is tightly controlled at a single portal.
Point security features a loosely controlled perimeter and the primary security focus is at the individual buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is CPTED?

A

CPTED, or crime prevention through environmental design, is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three types of CPTED measures? crime prevention through environmental design)

A
  1. Mechanical measures
  2. Organizational measures
  3. Natural measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are five examples of CPTED tools? crime prevention through environmental design)

A
  1. Natural territorial reinforcement
  2. Natural surveillance
  3. Natural access control
  4. Management and maintenance
  5. Legitimate activity support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This CPTED tool is the process of establishing a sense of ownership, responsibility, and accountability in property owners, manager, or occupants to increase vigilance in identifying trespassers.
(crime prevention through environmental design)

A

Natural territorial reinforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This CPTED (crime prevention through environmental design) tool states that increasing visibility by occupants and casual observers increases the detection of trespassers or misconduct at a facility.

A

Natural surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The idea of this (crime prevention through environmental design) tool is to employ both real and symbolic barriers - including doors, fences, and shrubbery - to define and limit access to a building or other space.

A

Natural access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This CPTED (crime prevention through environmental design) tool states that for spaces to look well cared for and crime-free, they must be maintained. This tool is also supported by the “broken windows” theory.

A

Management and maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This CPTED (crime prevention through environmental design) tool states that some places are difficult to protect by nature of their location or other geographic feature and space may need to be occupied to prevent it.

A

Legitamate activity support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the capable guardian concept?

A

The presence of a capable guardian may deter crime by reducing the site’s perceived vulnerability and make it less attractive to offenders?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the four main strategies of second generation CPTED (crime prevention through environmental design) aka the Four Cs?

A
  1. Cohesion
  2. Capacity threshold (tipping point)
  3. Community culture
  4. Connectivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What lenses are added in thrid generation CPTED (crime prevention through environmental design) and CPTED 3-D?

A

Third generation CPTED introduces sustainability and green technology.
CPTED 3-D incorporates designation of a space, its definition in terms of management and identity, and design as it relates to desired function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the six tasks of technical security projects?

A
  1. Risk analysis
  2. Conceptual (schematic)
  3. Design development
  4. Construction documents
  5. Bidding
  6. Construction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are two important outcomes of the initial phases of a design project?

A
  1. A security basis of design, focusing on the specific project requirements and a conceptual design solution based on those requirements.
  2. A business case to support the project
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The most critical asset in the group.

A

The level of protection for a group of assets must meet the protection needs of what?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are nine design criteria?

A

1, Codes and standards
2. Quality
3. Capacity
4. Performance
5. Features
6. Cost
7. Operations
8. Culture and image
9. Monitoring and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the purpose of the design concept?

A
  1. The design concept incorporates the basis of design
  2. documents the findings, conclusions and recommendations from any initial surveys
  3. is the first opportunity to document the project’s design
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is included in the typical construction documents (CD) phase package?

A
  1. CD drawings
  2. Specifications
  3. Bill of quantities
  4. Refined system budgets
  5. Contract terms and conditions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

System security drawings usually consist of what 5 items?

A
  1. Plans
  2. Elevations
  3. Details
  4. Risers
  5. Hardware schedules
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What two types of costs should be considered in the estimate?

A
  1. Capital projects and service projects
  2. Recurring costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are three types of cost estimates?

A
  1. Budgetary estimates
  2. Preliminary design estimates
  3. Final design estimates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

This type of cost estimate is prepared during the initial planning phase and the goal is to arrive at a cost figure that can be used for getting the new security system into the budget cycle.

A

Budgetary estimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

This type of cost estimate is prepared when the security system is part of a larger construction project and should include a contingency of plus or minus 10%.

A

Preliminary design estimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

This type of cost estimate is developed using the completed documents, drawings, and schedules and should have a contingency of plus or minus 5%.

A

Final design estimate

34
Q

What are components of life-cycle cost?

A
  1. Engineering and design costs
  2. hardware
  3. Software
  4. Installation costs
  5. Operating costs
  6. Maintenance costs
  7. Other costs
  8. Adjustments
35
Q

What are three forms of security systems procurement?

A
  1. Sole source
  2. Request for proposal (RFP)
  3. Invitation to bid (IFB)
36
Q

In this procurement method, the organization prequalifies a reputable security system contract, works with the contractor to design the system, and negotiates the cost of the equipment, installation, and service.

A

Sole source procurement

37
Q

This procurement method is the most common and is based on a set of detailed design and construction documents that form the basis of the organization’s functional requirements.

A

Request for proposal

38
Q

This procurement method is commonly used by government agencies and other organizations whose procedures require that projects be competitively bid and that the award be given to the lowest qualified, responsive bidder.

A

Invitation to bid

39
Q

The type of procurement process has a direct impact on what preparation?

A

The procurement affects the level of detail required in the construction documents.

40
Q

What is the pre-bid conference?

A

Each contractor is invited to meet with the owner or the owner’s consulting engineer for a complete review of the bid documents and a walk-through of the site.

41
Q

Why should life-cycle and warranty costs be calculated during proposal review?

A

Calculating those figures can reveal whether the low bidder has priced the system at a low profit margin but plans to make up the difference in high charges for maintenance.

42
Q

What three things should be determined when checking references for contractors?

A
  1. Is there good chemistry with the contractor’s representatives?
  2. Do they have the experience and power of personality to work well with the other trades on the project?
  3. How have they resolved problems that occurred on other projects?
43
Q

What is the challenge of project management?

A

To achieve all the project goals and objectives while living within the project’s time and budget constraints.

44
Q

What are four constraints of all security projects?

A
  1. Score
  2. Schedule
  3. Budget
  4. Quality
45
Q

What are the five phases of a project?

A
  1. Conception
  2. Planning
  3. Design management
  4. Bid process management (or participation)
  5. Construction (or construction review).
46
Q

What are seven types of barriers?

A
  1. Walls
  2. Floors
  3. Ceilings
  4. Roofs
  5. Doors
  6. Windows
  7. Other structures, such as symbolic and natural barriers
47
Q

What are two categories of safes?

A
  1. Safes designed for fire protection
  2. Safes designed for protection of valuables against forcible penetration
48
Q

What is a vault?

A

Specially constructed rooms or areas intended to limit access and provide protection to the assets in the space.
The term vault also applies to specially constructed rooms or areas that are designed to protect the contents from fire, but not necessarily theft.

49
Q

What are two general classes of locks?

A
  1. Mechanical
  2. Electrical
50
Q

This type of lock uses an arrangement of physical parts to prevent the opening of a bolt or latch.

A

Mechanical lock

51
Q

This type of lock can be locked or unlocked by a remote device.

A

Electrical lock

52
Q

What are common design or planning criteria for lock systems?

A
  1. Total number of locks
  2. Major categories of sectors of the system
  3. Security objectives
  4. Size and turnover of the population
  5. Related or supportive security subsystems
  6. Intelligence or information requirements
  7. Criticality of asset exposure
53
Q

What are five categories of general security lighting equipment?

A
  1. Streetlight
  2. Searchlight
  3. Floodlight
  4. Fresnel
  5. High mast lighting
54
Q

What are the three major security purposes of lighting?

A
  1. To create a psychological deterrent
  2. To enable detection
  3. To enhance the capabilities of video surveillance systems
55
Q

What are the four components of lighting systems?

A
  1. Lamp
  2. Luminaire
  3. Mounting hardware
  4. Electrical power
56
Q

What is intrusion detection?

A

The process of detecting a person or vehicle attempting to gain unauthorized entry into an area.

57
Q

What are the basic building blocks of an intrusion detection system?

A

Sensors

58
Q

What are the three main characteristics of intrusion sensor performance?

A
  1. Probability of detection
  2. Nuisance alarm rate
  3. Vulnerability to defeat
59
Q

What are three ways to defeat a sensor?

A
  1. Bypass
  2. Adversary path exploitation
  3. Spoof
60
Q

What are five ways to classify intrusion sensors?

A
  1. Passive or active
  2. Covert or visible
  3. Line-of-sight or terrain-following (for exterior sensors only)
  4. Volumetric or line detection
  5. Application
61
Q

What are the several main elements of a video surveillance system?

A
  1. Field of view
  2. Scene
  3. Lens
  4. Camera
  5. Transmission medium
  6. Workstation
  7. Recording equipment
62
Q

What questions can be asked to determine a camera system’s functional requirements?

A
  1. What is the purpose of the system?
  2. What specifically in each camera supposed to view?
  3. What are the requirements for proactive risk reduction, real-time monitoring, or recorded video?
63
Q

What are four reasons to have cameras in security applications?

A
  1. To obtain visual information about something that is happening
  2. To obtain visual information about something that has happened
  3. To deter or discourage undesirable activities
  4. To use video analytics tools
64
Q

For which three components of a physical security program can metrics be produced?

A
  1. Systems
  2. Personnel
  3. Compliance
65
Q

What is the goal of establishing metrics for physical security systems?

A

To reduce the amount of noise on the operator’s screen, thereby enabling the systems to operate efficiently.

66
Q

What are common types of alarms reported in physical security system metrics?

A
  1. Forced door
  2. Door held open
  3. Unauthorized access attempts
  4. User-defined actions/alarms
  5. Communications failure
67
Q

What is the purpose of tracking metrics for physical security personnel?

A

Provides an understanding of the appropriate expenditures and number and type of personnel required for effective physical security operations.

68
Q

What are two measurable performance categories for physical security personnel?

A
  1. Response
  2. Training
69
Q

What is the purpose of equipment performance testing?

A

Determine whether equipment is functional, has adequate sensitivity, and will meet its design and performance objectives.

70
Q

What is the purpose of personnel performance testing?

A
  1. Determine whether procedures are effective, whether personnel know and follow procedures, and whether personnel and equipment interact effectively.
71
Q

What are four types of equipment tests?

A
  1. Predelivery or factory acceptance tests
  2. Site acceptance tests
  3. Reliability or availability tests
  4. Post-implementation tests
72
Q

This type of testing is conducted to demonstrate that system performance complies with specified requirements in accordance with approved factory test procedures.

A

Predelivery or factory acceptance testing.

73
Q

This type of test tests all components and verifies data transmission system operation after the system has been installed and placed into service.

A

Site acceptance testing.T

74
Q

This type of test is conducted in alternating phases of testing and evaluation to allow for validation of the tests and corrective actions.

A

Reliability or availability testing

75
Q

What are six types of post-implementation tests?

A
  1. Operational tests
  2. Performance tests
  3. Post-maintenance tests
  4. Subsystem tests
  5. Limited scope tests
  6. Evaluation tests
76
Q

What requirements should be outlined in a warranty?

A

The contractor should be required to repair, correct, or replace any defect for a period of 12 months from the date of issue of the certificate of practical completion.

77
Q

What are two main tyes of physical protection system maintenance?

A
  1. Remedial maintenance or service contracts
  2. Preventative maintenance
78
Q

This type of maintenance corrects faults and returns the system to operation in the event that a hardware or software component fails.

A

Remedial maintenance

79
Q

This type of maintenance is scheduled to keep the hardware and software in good operating condition.

A

Preventative maintenance.

80
Q

What factors should be considered when justifying the cost of a replacement physical security system?

A
  1. Cost of maintenance
  2. Lack of spare parts
  3. Obsoleteness of hardware and software
  4. Operating costs
  5. Unreliability
81
Q
A