Physical Security Flashcards

1
Q

What is the difference between a design process based on performance criteria and one based on feature criteria?

A

A design process based on performance criteria will select elements and procedures according to the contribution they make to overall system performance.

A feature criteria approach selects elements or procedures to satisfy the requirements that certain items are present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three types of attacks used to defeat an axis controlled entry point?

A

Deceit,
Physical attack,
Technical attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is CPTED?

A

Crime prevention through environmental design, is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three types of CPTED solutions?

A

Mechanical measures,
Human and organizational measures,
Natural measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is natural territorial reinforcement?

A

Natural territorial reinforcement is the process of establishing a sense of ownership, responsibility, and accountability and property owners, managers, or occupants to increase vigilance in identifying trespassers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the “broken windows” theory?

A

The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian (i.e. security presence) is observed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Jane Jacobs “eyes on the street” theory?

A

A precursor to defensible space theory, it suggested that residential crime could be reduced by orienting buildings toward the street, clearly distinguishing public and private domains, and placing outdoor spaces near intensively used areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is defensible space?

A

The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment could elicit behavior from residents that would contribute significantly to their safety. It includes real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does situational crime prevention differ from CPTED and defensible space?

A

Situational crime prevention seeks to reduce crime opportunities in all behavioral contexts, not just in the built environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the best source of a protection dog?

A

A reputable professional breeder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What theory underpins situational crime prevention?

A

Rational choice theory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four approaches to situational crime prevention?

A

Increase the effort required (e.g. target hardening, access control),
Increase the risk of being caught (e.g. entry screening, surveillance),
Reduce anticipated rewards (e.g. target removal, property labeling),
Remove excuses (e.g. deploy signage simulating the conscience, rule setting).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the preferred glass type for mitigating blast forces?

A

Laminated glass is preferred for mitigating blast forces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four main strategies of second generation CPTED (the four Cs)?

A

Cohesion,
Capacity threshold (tipping point),
Community culture,
Connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When should security risks be addressed in architectural planning?

A

During the programming phase of design, when the owner describes the purpose and occupants of the building to the architect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three challenges that Security design poses for architects?

A

Determining requirements,
Knowing the technology,
Understanding architectural limitations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who may edit officers’ incident entries in a database log?

A

Higher level supervisors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How should changes or corrections be made in officers’ written log entries?

A

Under a new event number as a separate item.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

At what size and how far above the ground should an opening in a building’s shell be protected?

A

Reinforce or secure any openings in the building shell that measure more than 96 in.² (619 cm²) and are lower than 18 feet (5.5 m) above the ground.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the two most popular breeds of protection dogs in the United States?

A

German Shepherd,

Doberman Pinscher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Who should populate the command center at a special event?

A
Hosting organization,
Facility management,
Law enforcement,
Security,
Fire marshal,
Medical director,
Sponsors,
Promoters,
Transportation/parking,
Accommodations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What shape columns should be used in new parking facilities?

A

Round columns, because they allow for a greater visibility then square or rectangular columns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Where should stairwells and elevators be ideally located in parking facilities?

A

In the center, visible from wherever the attendant is posted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What kind of gates can be used for driveways where an overhead track would be in the way?

A

Cantilever slide gates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How many subjects should a single post order cover?

A

One.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When should a supervisor visit a security post?

A

Regularly, in an unscheduled manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What two values describe sensor effectiveness?

A

Probability of detection,

Confidence level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When is containment a good strategy?

A

When theft is the adversary’s goal. Containment involves preventing the adversary from leaving the site with stolen items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is “minimum resolvable temperature”?

A

The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder and the background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the five main ways of classifying exterior intrusion sensors?

A
Passive/active,
Covert/visible,
Line of sight/terrain following,
Volumetric/line detection,
Application.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

To what stimuli do ported coaxial cable sensors respond?

A

The motion of material with a high dielectric constant or high conductivity. People and metal vehicles are detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the three types of safes for fire protection?

A

Fire resistive safes,
Insulated filing devices,
Containers to protect magnetic media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the functional trade off when using dual technology motion sensors?

A

Lower false alarm rate, but lower detection sensitivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What do you call the process of testing every alarm point and each automatic function of a new alarm system?

A

Commissioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the four options for providing security for special events?

A

Use current security capabilities,
Provide security staff with training in special event security,
Hire a special event security provider,
Provide no security for the event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the most common type of electro mechanical sensor?

A

A simple mechanical switch, generally used on windows and doors, consisting of a switch unit and a magnetic unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a Hall effect switch?

A

An electronic switch mounted on a door including a magnet and switch unit that measures magnetic field strength. It provides higher security than balanced magnetic switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the two most common interior motion sensors?

A

Monostatic microwave,

Passive infrared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Where are PIR detectors likely to experience a nuisance alarm?

A

Passive infrared (PIR) detectors are likely to experience a nuisance alarm when placed near heat sources, such as lights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the most common type of wireless sensor?

A

Radio frequency (RF) sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What problems are inherent with radio frequency (RF) sensors?

A

Collisions,
Signal fade,
Interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the two person rule?

A

The two person rule requires that two knowledgeable people be involved in a situation or activity to prevent the compromise of facility security by a single insider (e.g. handling critical assets).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the three reasons to use CCTV in security installations?

A

View something that is happening,
View something that has already happened,
Deter unwanted activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Who are likely or possible members of a physical protection system (PPS) design team?

A
CEO,
Chief financial officer,
HR manager,
IT manager,
Facilities manager,
Project architect,
Construction manager,
Security systems designer,
Security manager.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are the three main parts of a digital video system?

A

Camera,
Digital electronic signal carrier,
PC with viewing or recording software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What three factors should determine selection of a CCTV camera?

A

Sensitivity,
Resolution,
Features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What four measures can be used to evaluate an immediate response to a Security event?

A

The time it takes for guards to arrive,
The probability of communication (from alarm trigger to officer response),
Interruption,
Neutralization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are the six basic application types of exterior security lighting?

A
Continuous,
Glare projection,
Standby,
Controlled,
Portable,
Emergency.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the CARVER process?

A

The CARVER (Criticality, Accessibility, Recuperability, Vulnerability, Effect, Recognizability) process is used to evaluate the attractiveness of a target for attack, from the perspective of the adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Field welds and brazing on factory boxes, enclosures, and conduits, should be coded with what?

A

Cold galvanized paint containing at least 95% zinc by weight.

51
Q

What kind of freestanding infrared sensors should be used in high security applications?

A

Multiple beam sensors should be used in high security applications because a single beam is easy to defeat.

52
Q

What are the four main types of CCTV cameras?

A

Standard analog CCD,
IP,
Infrared,
Thermal.

53
Q

How do electric field (capacitance) sensors work?

A

They detect a change in capacitive coupling among a set of wires attached to, but electrically isolated from, a fence.

54
Q

How do IP cameras measure their resolution?

A

IP camera resolution is measured as a multiple of the common intermediate format (CIF), which is 352×240.

55
Q

What are general orders?

A

Canons, or bodies of principles, for protection officers (e.g. no smoking on duty).

56
Q

Why are sensor fences less prone to nuisance alarms then fence disturbance sensors?

A

Because the transducers are not sensitive to vibrations and require a force of approximately 25 pounds (11.3 kg) on the wire to cause an alarm.

57
Q

Where do IP cameras rated as “power over ethernet” get their operational power?

A

From the digital switching system via the network.

58
Q

What are the five main types of CCTV lenses?

A
Wide angle,
Standard,
Telephoto,
Zoom,
Varifocal.
59
Q

What two factors control how high-rise building stairwells are secured?

A

Local fire and building codes, and whether inter-floor movement by occupants via the stairwells is permitted.

60
Q

What four elements determine the resolution of an image?

A

Camera,
Transmission method,
Weakest link in the video system interface,
Reproduction capability of the image storage system.

61
Q

What consideration determines the requirements for CCTV recording?

A

How the stored images will be used: to verify information, to prove information, or to aid in prosecution.

62
Q

What are the three forms of security system procurement?

A

Sole-source procurement,
Request for proposal (RFP),
Invitation for bid (IFB).

63
Q

What should be the primary basis for camera selection?

A

The sensitivity required for a full video output signal in the lighting environment in the area to be assessed.

64
Q

What do UL labels on record safes for fire protection indicate?

A

Whether it is a fire resistant safe or an insulated records container,
The duration of protection,
The temperature that the inside of the container can withstand.

65
Q

What are riser diagrams?

A

Riser diagrams are presentations of complete sub systems, such as CCTV or access control, that schematically demonstrate all of the associated devices and components and their interconnecting cables.

66
Q

What are the three primary functions of security lighting?

A

Deterrence,
Life safety,
Video lighting.

67
Q

The amount of light necessary to produce a usable video signal from any video camera is a function of what five factors?

A

The type and brightness of the source,
The amount of light energy illuminating the scene of interest,
The portion of the light reflected from the scene,
The amount of light transmitted by the lens to the imager,
The sensitivity of the imaging device itself.

68
Q

What are the three steps in creating an adversary sequence diagram (ASD)?

A

Describe the facility by separating it into adjacent physical areas,
Define protection layers and path elements between adjacent areas,
Record detection and delay values for each path element.

69
Q

What is a design basis?

A

The set of security requirements that is used as the basis of the eventual design of the physical protection system. It is the result of the overall planning phase.

70
Q

What is the major benefit of planned overlapping of security officer shifts?

A

To cover peak events such as plant shift changes or office breaks.

71
Q

What is color rendition?

A

The ability of a lamp to faithfully reproduce the colors seen in an object.

72
Q

What are the four most significant factors affecting life safety in high-rises?

A

Early detection and location of hazards,
Reliable communications with outside agencies,
Safe escape routes,
Prompt application of control measures, such as extinguishing fires.

73
Q

What are the four principal components of a lighting system

A

Lamp (lightbulb),
Luminaire (fixture),
Mounting hardware,
Electrical supply.

74
Q

How do you measure the energy efficiency (efficacy) of a lighting system?

A

Divide the lamp’s output in lumens by the lamp’s power draw in watts.

75
Q

What are the five types of general security lighting equipment?

A
Streetlight,
Searchlight,
Floodlight,
Fresnel,
High mast.
76
Q

What are the three most critical threats in high-rise structures?

A

Fire,
Explosion,
Contamination of support systems.

77
Q

What is the “necessary human being” concept?

A

The particular characteristics and reactions required at a security post necessitate human capabilities.

78
Q

What is the preferred application of exterior security lighting during hours of darkness?

A

Continuous: illumination devices deployed in a series maintain uniform lighting.

79
Q

What are post orders based on?

A

Standard operating procedures.

80
Q

What are the two critical elements of an alarm communications and display system (AC&D)?

A

Transportation/communication of data,

Presentation of that data to a human operator in a meaningful manner.

81
Q

What are the four main concerns in Security communications?

A

Integrity of the communications medium,
Integrity of the message,
Timeliness of the transmission,
Message Security.

82
Q

What should a full set of physical protection system (PPS) procurement documents (contract documents) contain?

A

Contractual details,
Construction specifications,
Construction drawings.

83
Q

In what ways does optical fiber differ from traditional metal wires?

A

Optical fiber:
Is not affected by electromagnetic or radio frequency interference,
Does not carry electrical current or radiate signals,
Can carry many more different multiplexed signals,
Can’t be intercepted by acoustical or inductive coupling.

84
Q

What is the significance of the formula

PE = PI x PN?

A

A physical protection system’s effectiveness is equal to the probability of interruption (e.g. arrival of responders) times the probability of neutralization (e.g. defeat of adversary by responders).

85
Q

What types of materials are dispensed in dispensable barriers?

A
Rigid foam,
Aqueous foam,
Sticky foam,
Smoke or fog,
Entanglement devices.
86
Q

When can video be transmitted on dedicated twisted wire pairs?

A

Video can be transmitted on dedicated twisted wire pairs when there is no bridging or coupling, and there are no other connections on the wire path between the video transmitter and receiver.

87
Q

What is a McCulloh circuit?

A

A McCulloh circuit is one in which, when an open occurs, the circuit is switched to send current from the control unit over both sides of the circuit wires out to the breakpoint.

88
Q

What are the three types of line transmission installations used in electronic protection systems?

A

Loop system,
Point to point system,
Multiplexing system.

89
Q

What is the biggest vulnerability of a loop system?

A

All the detectors in an area could be disabled by interrupting the loop at the proper location.

90
Q

What is the biggest vulnerability of a multiplexed system?

A

Interruption or destruction of a multiplexed communication link results in the interruption of all signals on that link.

91
Q

What are the two general methods of separating individual signals in the multiplexing process?

A

Time separation or time division multiplexing,

Frequency separation or frequency division multiplexing.

92
Q

What are four key considerations in video recording?

A

Resolution,
Length of storage,
Frames per second,
Compression type (codec).

93
Q

What’s the simplest type of line supervision?

A

An end of line resistor installed to introduce a constant, measurable electric current.

94
Q

What are the two characteristics of a voice that can be modified to reduce or destroy it’s intelligibility?

A

Frequency (pitch),

Amplitude (Loudness).

95
Q

What are the benefits and drawbacks of frequency inverters?

A

Benefits:
They are inexpensive,
They can tolerate poor transmission conditions.
Drawbacks:
They can be defeated by anyone with a similar scrambler,
Trained listeners can understand the scrambled voice.

96
Q

On what should the decision of whether to arm an officer be based?

A

Whether there is greater danger to life safety without a weapon,
Whether the officer may reasonably be expected to use fatal force.

97
Q

What four concerns must be addressed in alarm Consol design?

A

What information is shown to the operator,
How information is presented,
How the operator communicates with the system,
How to arrange the equipment at the operator’s workstation.

98
Q

What three ergonomic factors must an alarm control/display area include?

A

What the operator needs to see,
What the operator needs to hear,
What the operator needs to reach and manipulate.

99
Q

What are the three key factors that relate to officer behavior?

A

Courtesy,
Restraint,
Interest.

100
Q

Why should color be used sparingly in graphical alarm displays?

A

Because 10% of the population has some form of color blindness.

101
Q

What are the objectives of an entry control system used for physical protection?

A

To permit only authorized persons to enter and exit,
To detect and prevent the entry or exit of contraband material,
To provide information to security personnel to facilitate assessment and response.

102
Q

What is the difference between entry control and access control?

A

Entry control refers to physical equipment used to control the movement of people or material into an area.
Access control refers to the process of managing data bases or other records and determining the parameters of authorized entry.

103
Q

What are the measures of effectiveness of an entry control system?

A

Throughput,

Error rates.

104
Q

What are the three ways of verifying personnel entry?

A

What you have (credential),
What you know (PIN, password),
What you are (biometrics).

105
Q

What system reduces the possibility that a facility badge can be counterfeited, lost, or stolen?

A

An exchange badge system.

106
Q

What are the main advantages of a smart card?

A

Large memory,

High degree of resistance to forgery or compromise.

107
Q

Despite their high cost, when might the use of smart cards be appropriate?

A

In a small population for use at a very high security facility, or to limit access to certain areas in large facilities.

108
Q

What is the most important consideration when a security officer deals with a disturbed person?

A

Bringing the person into custody and eliminating immediate danger.

109
Q

How does the hand geometry biometric work?

A

It measures three dimensional features of the hand, such as the widths and lengths of fingers and the thickness of the hand.

110
Q

When should security officers be responsible for escorts?

A

To accompany people carrying high-value assets,
When physical safety is a concern,
When a sick or disabled person needs assistance.

111
Q

What to operational issues have hindered the adoption of facial recognition?

A

Wide variations in the presentation of the face (head tilt, glasses, facial hair, etc.),
Lighting variations.

112
Q

What are the shortcomings of magnetometers?

A

They detect only ferromagnetic materials, so they don’t detect material such as copper, aluminum, and zinc.

113
Q

What are the five main types of mechanical locks?

A
Worded lock,
Lever lock,
Pin Tumbler lock,
Wafer Tumbler lock,
Dial combination lock.
114
Q

What are the three main vulnerabilities of master locks?

A

Attack by force,
Picking,
Milled key blanks.

115
Q

What factors affect a dog’s tracking and trailing ability?

A
Ground type,
Weather conditions,
Temperature,
Conflicting odors,
Terrain factors.
116
Q

What is the difference between fail safe and fail secure?

A

A fail safe locking mechanism will unlock under any failure condition, such as power loss.
A fail secure mechanism will lock under any failure condition.

117
Q

When would welded wire fabric be used for fencing?

A

In lower security applications.

118
Q

For access control purposes, how should high-rise buildings be divided?

A

Public access/common areas,
Tenant spaces,
Maintenance spaces.

119
Q

According to Fennelly, what are the three key tools in crime prevention programs?

A

Planning,
Management,
Evaluation.

120
Q

What is a good practice to make sure a guest wears a badge while on the premises?

A

Explain to the person that the badge permits immediate recognition by and assistance from employees.

121
Q

What are cost effective ways to use rolls of barbed tape to enhance intrusion prevention of fences?

A

Attach a roll of barbed tape to the outriggers.
Please barbed tape rolls horizontally on the ground or against the fence - Inside the outer (perimeter) fence and/or outside the interior fence.

122
Q

What are the first steps in upgrading a facilities resistance to penetration?

A

Eliminating unnecessary doors and windows.

123
Q

What are the three most common methods of training protection dogs?

A

Positive reinforcement (praise),
Compulsion (Negative corrections),
Inducement (Toys, food).

124
Q

What are the main functions of a physical protection system (PPS)?

A

The primary functions are detection, delay, and response.

Deterrence is a secondary function.