Physical Security Flashcards
What is the difference between a design process based on performance criteria and one based on feature criteria?
A design process based on performance criteria will select elements and procedures according to the contribution they make to overall system performance.
A feature criteria approach selects elements or procedures to satisfy the requirements that certain items are present.
What are the three types of attacks used to defeat an axis controlled entry point?
Deceit,
Physical attack,
Technical attack.
What is CPTED?
Crime prevention through environmental design, is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means.
What are the three types of CPTED solutions?
Mechanical measures,
Human and organizational measures,
Natural measures.
What is natural territorial reinforcement?
Natural territorial reinforcement is the process of establishing a sense of ownership, responsibility, and accountability and property owners, managers, or occupants to increase vigilance in identifying trespassers.
What is the “broken windows” theory?
The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian (i.e. security presence) is observed.
What is Jane Jacobs “eyes on the street” theory?
A precursor to defensible space theory, it suggested that residential crime could be reduced by orienting buildings toward the street, clearly distinguishing public and private domains, and placing outdoor spaces near intensively used areas.
What is defensible space?
The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment could elicit behavior from residents that would contribute significantly to their safety. It includes real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance.
How does situational crime prevention differ from CPTED and defensible space?
Situational crime prevention seeks to reduce crime opportunities in all behavioral contexts, not just in the built environment.
What is the best source of a protection dog?
A reputable professional breeder.
What theory underpins situational crime prevention?
Rational choice theory.
What are the four approaches to situational crime prevention?
Increase the effort required (e.g. target hardening, access control),
Increase the risk of being caught (e.g. entry screening, surveillance),
Reduce anticipated rewards (e.g. target removal, property labeling),
Remove excuses (e.g. deploy signage simulating the conscience, rule setting).
What is the preferred glass type for mitigating blast forces?
Laminated glass is preferred for mitigating blast forces.
What are the four main strategies of second generation CPTED (the four Cs)?
Cohesion,
Capacity threshold (tipping point),
Community culture,
Connectivity.
When should security risks be addressed in architectural planning?
During the programming phase of design, when the owner describes the purpose and occupants of the building to the architect.
What are the three challenges that Security design poses for architects?
Determining requirements,
Knowing the technology,
Understanding architectural limitations.
Who may edit officers’ incident entries in a database log?
Higher level supervisors.
How should changes or corrections be made in officers’ written log entries?
Under a new event number as a separate item.
At what size and how far above the ground should an opening in a building’s shell be protected?
Reinforce or secure any openings in the building shell that measure more than 96 in.² (619 cm²) and are lower than 18 feet (5.5 m) above the ground.
What are the two most popular breeds of protection dogs in the United States?
German Shepherd,
Doberman Pinscher.
Who should populate the command center at a special event?
Hosting organization, Facility management, Law enforcement, Security, Fire marshal, Medical director, Sponsors, Promoters, Transportation/parking, Accommodations.
What shape columns should be used in new parking facilities?
Round columns, because they allow for a greater visibility then square or rectangular columns.
Where should stairwells and elevators be ideally located in parking facilities?
In the center, visible from wherever the attendant is posted.
What kind of gates can be used for driveways where an overhead track would be in the way?
Cantilever slide gates.
How many subjects should a single post order cover?
One.
When should a supervisor visit a security post?
Regularly, in an unscheduled manner.
What two values describe sensor effectiveness?
Probability of detection,
Confidence level.
When is containment a good strategy?
When theft is the adversary’s goal. Containment involves preventing the adversary from leaving the site with stolen items.
What is “minimum resolvable temperature”?
The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder and the background.
What are the five main ways of classifying exterior intrusion sensors?
Passive/active, Covert/visible, Line of sight/terrain following, Volumetric/line detection, Application.
To what stimuli do ported coaxial cable sensors respond?
The motion of material with a high dielectric constant or high conductivity. People and metal vehicles are detected.
What are the three types of safes for fire protection?
Fire resistive safes,
Insulated filing devices,
Containers to protect magnetic media.
What is the functional trade off when using dual technology motion sensors?
Lower false alarm rate, but lower detection sensitivity.
What do you call the process of testing every alarm point and each automatic function of a new alarm system?
Commissioning.
What are the four options for providing security for special events?
Use current security capabilities,
Provide security staff with training in special event security,
Hire a special event security provider,
Provide no security for the event.
What is the most common type of electro mechanical sensor?
A simple mechanical switch, generally used on windows and doors, consisting of a switch unit and a magnetic unit.
What is a Hall effect switch?
An electronic switch mounted on a door including a magnet and switch unit that measures magnetic field strength. It provides higher security than balanced magnetic switches.
What are the two most common interior motion sensors?
Monostatic microwave,
Passive infrared.
Where are PIR detectors likely to experience a nuisance alarm?
Passive infrared (PIR) detectors are likely to experience a nuisance alarm when placed near heat sources, such as lights.
What is the most common type of wireless sensor?
Radio frequency (RF) sensors.
What problems are inherent with radio frequency (RF) sensors?
Collisions,
Signal fade,
Interference.
What is the two person rule?
The two person rule requires that two knowledgeable people be involved in a situation or activity to prevent the compromise of facility security by a single insider (e.g. handling critical assets).
What are the three reasons to use CCTV in security installations?
View something that is happening,
View something that has already happened,
Deter unwanted activities.
Who are likely or possible members of a physical protection system (PPS) design team?
CEO, Chief financial officer, HR manager, IT manager, Facilities manager, Project architect, Construction manager, Security systems designer, Security manager.
What are the three main parts of a digital video system?
Camera,
Digital electronic signal carrier,
PC with viewing or recording software.
What three factors should determine selection of a CCTV camera?
Sensitivity,
Resolution,
Features.
What four measures can be used to evaluate an immediate response to a Security event?
The time it takes for guards to arrive,
The probability of communication (from alarm trigger to officer response),
Interruption,
Neutralization.
What are the six basic application types of exterior security lighting?
Continuous, Glare projection, Standby, Controlled, Portable, Emergency.
What is the CARVER process?
The CARVER (Criticality, Accessibility, Recuperability, Vulnerability, Effect, Recognizability) process is used to evaluate the attractiveness of a target for attack, from the perspective of the adversary.