Physical security - Garima's Deck Flashcards

1
Q

What are the primary functions of a PPS?

A

Detection, Delay and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a defence in depth approach?

A

An adversary must avoid or defeat a number of protective devices or features in sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the design concept?

A

The design concept incorporates the basis of design; documents its findings, conclusions and recommendations from any initial survey, and is the first opportunity to document the project’s design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What approach generally yields the most effective design solution a problem?

A

Systems approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Risk Management?

A

Risk Management is coordinated activities to direct and control an organization with regard to risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Risk Management rely on?

A

Risk Management relies on risk assessment, which in turn relies on vulnerability assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Risk Assessment rely on?

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the classes in which adversaries can be classified?

A

Outsiders, Insiders, and outsiders in collusion with insiders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four estimates of likelihood of attack?

A

Frequency estimate, possibility estimate, qualitative estimate, conditional estimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of estimate of likelihood of attack ranks the attack possibility of an event?

A

Qualitative estimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A well designed and integrated PPS is more effective against ____________ (fill in the blanks)

A

low level threats than high high level threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A well designed and integrated PPS is more effective against ____________ (fill in the blanks)

A

low level threats than high high level threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If a PPS is not meeting its goals and objectives it is time to begin

A

Part II of the PPS system - the design phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which is the most difficult security measure to quantify

A

deterrance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is detection, in itself, worth little?

A

Potential for false positive is directly related to the sensitivity of the PPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An effective physical security strategy employs seven basic functions in an orchestrated and tailored manner.

A
  1. Access Control
  2. Deterrence
  3. Detection
  4. Assessment
  5. Delay
  6. Response
  7. Evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three formats of barriers?

A

Structural components, electrical components, and human components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of lock should be used if there are windows on either side of the door?

A

A double cylinder keyed deadbolt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Mention types of physical security mesures?

A

Barriers, fencing, bollards, terrain, locks, design architecture and engineering, CPTED, landscaping, lighting, and glass treatment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Mention types of electronic security measures

A

Surveillance, access control, intrusion detection systems, communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What purposes does an incident management system serves?

A

guiding a response to an incident in real time
supporting post-incident analysis and recurrence reduction

informing the planning process for physical security upgrades or program modifications

assessing the effects of facility design and layout on incident prevention and response

comparing incident characteristics in similar facilities based on physical security traits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What should the methodology employed in physical security assessments examine?

A

general and specific threats, vulnerabilities, asset criticality, potential consequences, likelihood, severity, and velocity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The physical security assessment/security survey is one tool to specifically address

A

the security risk to physical (tangible) assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A risk assessment lays more stress on vulnerabilities or a security survey?

A

Security survey. Whereas a comprehensive risk assessment focuses equally on assets, threats, vulnerabilities, and consequences, a security survey places more emphasis on vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the factors to consider when addressing vulnerabilities?
lack of redundancy or backups for critical functions or systems single points of failure collocation of critical systems, organizations, or components inadequate response capability to recover from an attack ease of aggressor access to a facility inadequate security measures in place presence of hazardous materials potential for collateral damage from other companies in the area
26
When conducting a security survey, which of the following should be a focus of the assessment? Assets, vulnerabilities, threats, or, consequences
vulnerabilities
27
In a security survey, what helps to ensure that the key elements are not overlooked?
Checklist
28
One thinks like an adversary in which type of physical security assessment methodology?
Outside Inward Methodology
29
In which physical security assessment methodology does the assessment team takes the role of the "defender"?
Inside Outside Methodology
30
This approach addresses each security function or discipline individually and then collates the findings from the assessment components. Which approach is this?
Function (Security Discipline) Methodology
31
Why should the software not be relied on as the sole element in conducting a physical security assessment?
Some automated risk analysis tools are in general ineffective in dealing with intangible factors and information that is difficult to quantify.
32
What are the three steps of gap analysis?
1. What is 2. What should be 3. What to consider
33
What are the basic factors of security design?
governing codes and regulations protection requirements company standards and guidelines type of construction site layout material selection utilities life safety infrastructure
34
This process requires consideration of the threat type, tactics, mode of operations, capabilities, threat level, and likelihood of occurrence. Threats come from malevolent humans, not accidental (safety-related) events. This process is BEST defined as which of the following? 1. Loss event profiles 2. Adversarial Sequence Diagram 3. Design basis threat 4. Threat Risk Assessment
Design basis threat
35
Which lights best support color CCTV?
metal halide lights best support color CCTV because it emits a white type of light
36
___________gives off a yellowish light
high-pressure sodium lights give off a yellowish light
37
What are some delay tactics (wrt building access)?
Serpentine drives and parking standoff
38
What is a physically effective and cost effective approach (design solution) wrt building access?
serpentine pattern barriers in front of retractable bollards.
39
Which is the preferred glass type for mitigating blast forces?
Laminated glass
40
What does it mean to be fail safe?
Automatic release of locks
41
Glow in dark signage is an example of
wayfinding measure
42
In the design of a new high-rise structure and considering life safety aspects of the building, which should rank as a first priority? CPTED principles in the building design Controlled access and surveillance for legitimate users Fire detection, confinement, extinguishment, evacuation, and, escape Adversary deterrence, detection, delay, deny, and, defence
Fire detection, confinement, extinguishment, evacuation and escape
43
What are the three underlying elements of CPTED?
Territoriality (Natural) Surveillance (Organizational) Access Control (Mechanical)
44
The property owners in a 20-unit townhouse complex implemented signage and designed the landscaping to deter unwanted activity and trespassing. They also designed the area to provide better sight-lines of the children’s playground from the inside of the residences. They intend to establish a sense of ownership, responsibility, and accountability with property owners, to increase vigilance in identifying trespassers. Which of the following CPTED terms BEST meets this community’s intent? Target attractiveness Natural territorial reinforcement Random activity theory Neighbourhood watch
Natural territorial reinforcement
45
When designing a new multi-level parking garage, to increase visibility, both interior-to-exterior and exterior-to-interior to facilitate witness potential, and make the likely adversary fear exposure, is described in CPTED as which of the following? Natural surveillance Natural access control Natural territorial reinforcement Compartmentalization
Natural surveillance
46
CPTED is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means. CPTED is a crime prevention theory grounded in environmental criminology. CPTED primarily focuses on which of the following PPS principles? Deterrence Detection Delay Response
Deterrence
47
What are the steps in preventing repeat victimization?
Quickly remove signs of victimization Improve physical security Block easy access to targets Protect especially vulnerable targets Regulate access to high risk assets or areas
48
What are the four main strategies of second generation CPTED?
Cohesion Capacity threshold Community Culture Connectivity
49
What is another name for the tipping point theory?
Capacity threshold
50
What are the main lighting sources (lamp types)?
Incandescent Halogen and quartz halogen Fluorescent Mercury vapor Metal halide High pressure sodium Low pressure sodium LED Induction
51
Which lamps have a poor rendition for video surveillance because of the blue light they cast?
Mercury vapor
52
Which lamps have a poor rendition for video surveillance because of the blue light they cast?
Mercury vapor
53
Which lamps are used at sports stadiums because they imitate daylight conditions and color appears natural and also work well with video surveillance systems?
Metal halide
54
Which lamps suffer from poor color rendition but are used on streets and in parking lots as they allow to see more detail at greater distances in fog?
High pressure sodium
55
Which are the lamps which have poor color rendition for video surveillance systems?
Mercury vapor High pressure sodium Low pressure sodium
56
Which lamps are used mainly indoors which have a long life?
Induction
57
Which light is invisible to naked eye but useful for video scene illumination?
Infrared lighting
58
Which of the following lighting systems have the best color rendition for night lighting?
Metal halide
59
A security practitioner is designing a PPS for a hospital parking garage and is considering security lighting to enhance the CCTV surveillance and monitoring. What is the BEST type of lighting to apply?
LED
60
What are the characteristics that effect the security effectiveness of light use and lighting systems?
Quantity of lights Level or intensitiy of light or illuminance Light reflection of surrounding materials Color temperature of the light
61
What are the three main characteristics of intrusion sensor performance?
Probability of detection Nuisance alarm rate Vulnerability to defeat
62
What are the factors on which the probability of detection relies?
target to be detected (e.g., walking/running/crawling intruder, tunneling, etc.), in addition to the direction and speed of target movement through the sensors’ pattern sensor hardware design installation conditions sensitivity adjustment weather conditions condition of the equipment
63
What are alarm initiation conditions?
Occurrence of a potential intrusion event. These are intrusion sensors. A change in a safety or process condition being monitored (rise in temperature, presence of smoke, etc.). These are state sensors. Loss of electrical power. These are fault event sensors. Opening, shorting, or grounding of the device circuitry; tampering with the sensors; or changes in impedance on a circuit enclosure or distributed control panels (transponders). These are tamper sensors. Failure of the sensor itself. This is another fault event that should be detected.
64
What are the five characteristics that aid in the design and operation of an intrusion sensor system?
Probability of detection Nuisance alarm rate Vulnerabulity to defeat Alarm initiation conditions Operating conditions
65
This detector absorbs invisible light energy comparing actual energy to established background energy. What type of detector is this? Passive infrared Active infrared Active microwave Passive microwave
Passive infrared
66
This detector can use buried cable or transmitting and receiving signals relying on consistent reception of transmitted or reflected energy. When energy levels change due to a reflection or deflection, an alarm is transmitted. This is called _________ detection.
Microwave
67
What are the uses of video surveillance?
Surveillance Assessment Forensics Risk Mitigation
68
What are the main elements of a video surveillance system?
Field of view Scene Lens Camera Transmission medium Workstation Recording equipment
69
Which of the following statements best describes a CCTV's field of view? The location or area intended to be observed The area visible through the camera lens The view from the camera that is recorded The function of CCTV which best controls color rendition
The area visible through the camera lens
70
Which of the following BEST fits this description of this video surveillance component: “This determines the clarity and size of the field of view.” The camera The monitor The recording equipment The lens
The lens
71
What questions should be asked to discern a video surveillance system's functional requirements?
What is the purpose of the system? What specifically is each camera supposed to view? What are the requirements for proactive risk reduction, real time monitoring or recorded video?
72
What are the four reasons to have cameras in security applications?
To obtain visual information about something that is happening To obtain visual information about something that has happened To deter or discourage undesirable activities To use video analytics tools.
73
What are the three identification views of VSS?
Subject identification Action identification Scene identification
74
When selecting a VSS it is important to use a systems approach. True or False
True
75
What are the two critical elements of AC&D system?
Transportation or communication of data Presentation or display of that data to a human operator in a meaningful form.
76
What are the AC&D Attributes?
Robustness is a measure of system performance in all probable environments. The individual components should be reliable and have a long mean time between failures (MTBF). Provide redundant or backup capability for critical components factoring in the possibility of failure. Alarm information must be available to security personnel in a timely manner. AC&D systems must be easy for an operator to use.
77
When an alarm event occurs, what should AC&D system inform the operator?
Where the alarm has occurred What or who caused the alarm When the alarm happened Response or action required
78
What are the subsystems AC&D system is divided into?
communications, line supervision and security, information handling, control and display, assessment, and off-line subsystems.
79
What characteristics drive the design of alarm communication systems?
Quantity of alarm data High reliability needed for the system Speed at which the data must be delivered
80
Which of the following are outcomes of the planning phase? Select all that apply. A set of security requirements or objectives A risk assessment and risk mitigation plans Procurement lists and purchase orders The business case for the new or upgraded security systems
A set of security requirements or objectives. The business case for the new or upgraded security systems
81
Which of the following are outcomes of the planning phase? Select all that apply. A set of security requirements or objectives A risk assessment and risk mitigation plans Procurement lists and purchase orders The business case for the new or upgraded security systems
A set of security requirements or objectives. The business case for the new or upgraded security systems
82
These diagrams show complete security subsystems, including all the devices and how they are connected in a building or campus. They are called: Details diagrams Plan drawings Elevation drawings Riser Diagrams
Riser Diagrams
83
Prepared during initial planning phase with a large contingency ( +/- 10 to 20%) Budgetary estimate Preliminary design estimate Final design estimate
Budgetary estimates
84
Developed at the 50% design review stage and normally has a contingency of + / - 10% Budgetary estimate Preliminary design estimate Final design estimate
Preliminary design estimate
85
Refined as the project advances to 100% completion with minimum contingency Budgetary estimate Preliminary design estiamte Final design estimate
Final design estimate
86
The actual cost of a security system is its __________
lifecycle cost
87
When in the procurement stage, an invitation for bids (IFB) will list specific equipment and software and request prices from the contractors to supply the specific items and install them. This is BEST described as: Design estimation Design specification Design planning Design evaluation
Design specification
88
In its simplest form, the lifecycle cost is the sum of __
the capital cost and the maintenance cost over the useful life of the system
89
Typically the warranty cost and maintenance cost equals to _____% of the total capital systems construction costs.
11%
89
Successful implementation of any physical security construction project requires a well-defined and executed procurement contract, as the lifecycle of implementing a typical system should take
18 to 24 months
90
What is the testing conducted on a test system in advance of installation called?
Factory acceptance testing
91
This type of testing demonstrates the completed system complies with contract requirements. What is it called?
Site acceptance testing
92
Alternates testing and evaluation to allow for validation and corrective actions is called _______.
Reliability testing
93
What affects the effectiveness of automated assessment tools?
Qualification of assessment personnel Cost of assessment tools Complexity of assessment software Software's inability to assess intangible factors and characteristics
94
What are the four principal security strategies identified by most security designers?
Prevention Detection Control Intervention
95
Homeland security features five principal strategies. What are these?
Preparation Prevention Detection Response Recovery
96
What are the four applications for security lighting?
Standby Continuous Movable Emergency