Physical security - Garima's Deck Flashcards

1
Q

What are the primary functions of a PPS?

A

Detection, Delay and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a defence in depth approach?

A

An adversary must avoid or defeat a number of protective devices or features in sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the design concept?

A

The design concept incorporates the basis of design; documents its findings, conclusions and recommendations from any initial survey, and is the first opportunity to document the project’s design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What approach generally yields the most effective design solution a problem?

A

Systems approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Risk Management?

A

Risk Management is coordinated activities to direct and control an organization with regard to risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Risk Management rely on?

A

Risk Management relies on risk assessment, which in turn relies on vulnerability assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Risk Assessment rely on?

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the classes in which adversaries can be classified?

A

Outsiders, Insiders, and outsiders in collusion with insiders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four estimates of likelihood of attack?

A

Frequency estimate, possibility estimate, qualitative estimate, conditional estimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of estimate of likelihood of attack ranks the attack possibility of an event?

A

Qualitative estimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A well designed and integrated PPS is more effective against ____________ (fill in the blanks)

A

low level threats than high high level threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A well designed and integrated PPS is more effective against ____________ (fill in the blanks)

A

low level threats than high high level threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If a PPS is not meeting its goals and objectives it is time to begin

A

Part II of the PPS system - the design phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which is the most difficult security measure to quantify

A

deterrance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is detection, in itself, worth little?

A

Potential for false positive is directly related to the sensitivity of the PPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An effective physical security strategy employs seven basic functions in an orchestrated and tailored manner.

A
  1. Access Control
  2. Deterrence
  3. Detection
  4. Assessment
  5. Delay
  6. Response
  7. Evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three formats of barriers?

A

Structural components, electrical components, and human components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of lock should be used if there are windows on either side of the door?

A

A double cylinder keyed deadbolt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Mention types of physical security mesures?

A

Barriers, fencing, bollards, terrain, locks, design architecture and engineering, CPTED, landscaping, lighting, and glass treatment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Mention types of electronic security measures

A

Surveillance, access control, intrusion detection systems, communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What purposes does an incident management system serves?

A

guiding a response to an incident in real time
supporting post-incident analysis and recurrence reduction

informing the planning process for physical security upgrades or program modifications

assessing the effects of facility design and layout on incident prevention and response

comparing incident characteristics in similar facilities based on physical security traits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What should the methodology employed in physical security assessments examine?

A

general and specific threats, vulnerabilities, asset criticality, potential consequences, likelihood, severity, and velocity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The physical security assessment/security survey is one tool to specifically address

A

the security risk to physical (tangible) assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A risk assessment lays more stress on vulnerabilities or a security survey?

A

Security survey. Whereas a comprehensive risk assessment focuses equally on assets, threats, vulnerabilities, and consequences, a security survey places more emphasis on vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the factors to consider when addressing vulnerabilities?

A

lack of redundancy or backups for critical functions or systems
single points of failure
collocation of critical systems, organizations, or components
inadequate response capability to recover from an attack
ease of aggressor access to a facility
inadequate security measures in place
presence of hazardous materials
potential for collateral damage from other companies in the area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When conducting a security survey, which of the following should be a focus of the assessment? Assets, vulnerabilities, threats, or, consequences

A

vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In a security survey, what helps to ensure that the key elements are not overlooked?

A

Checklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

One thinks like an adversary in which type of physical security assessment methodology?

A

Outside Inward Methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In which physical security assessment methodology does the assessment team takes the role of the “defender”?

A

Inside Outside Methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

This approach addresses each security function or discipline individually and then collates the findings from the assessment components. Which approach is this?

A

Function (Security Discipline) Methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Why should the software not be relied on as the sole element in conducting a physical security assessment?

A

Some automated risk analysis tools are in general ineffective in dealing with intangible factors and information that is difficult to quantify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the three steps of gap analysis?

A
  1. What is 2. What should be 3. What to consider
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the basic factors of security design?

A

governing codes and regulations
protection requirements
company standards and guidelines
type of construction
site layout
material selection
utilities
life safety
infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

This process requires consideration of the threat type, tactics, mode of operations, capabilities, threat level, and likelihood of occurrence. Threats come from malevolent humans, not accidental (safety-related) events. This process is BEST defined as which of the following?
1. Loss event profiles
2. Adversarial Sequence Diagram
3. Design basis threat
4. Threat Risk Assessment

A

Design basis threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which lights best support color CCTV?

A

metal halide lights best support color CCTV because it emits a white type of light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

___________gives off a yellowish light

A

high-pressure sodium lights give off a yellowish light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are some delay tactics (wrt building access)?

A

Serpentine drives and parking standoff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a physically effective and cost effective approach (design solution) wrt building access?

A

serpentine pattern barriers in front of retractable bollards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which is the preferred glass type for mitigating blast forces?

A

Laminated glass

40
Q

What does it mean to be fail safe?

A

Automatic release of locks

41
Q

Glow in dark signage is an example of

A

wayfinding measure

42
Q

In the design of a new high-rise structure and considering life safety aspects of the building, which should rank as a first priority?
CPTED principles in the building design
Controlled access and surveillance for legitimate users
Fire detection, confinement, extinguishment, evacuation, and, escape
Adversary deterrence, detection, delay, deny, and, defence

A

Fire detection, confinement, extinguishment, evacuation and escape

43
Q

What are the three underlying elements of CPTED?

A

Territoriality (Natural)
Surveillance (Organizational)
Access Control (Mechanical)

44
Q

The property owners in a 20-unit townhouse complex implemented signage and designed the landscaping to deter unwanted activity and trespassing. They also designed the area to provide better sight-lines of the children’s playground from the inside of the residences. They intend to establish a sense of ownership, responsibility, and accountability with property owners, to increase vigilance in identifying trespassers. Which of the following CPTED terms BEST meets this community’s intent?
Target attractiveness
Natural territorial reinforcement
Random activity theory
Neighbourhood watch

A

Natural territorial reinforcement

45
Q

When designing a new multi-level parking garage, to increase visibility, both interior-to-exterior and exterior-to-interior to facilitate witness potential, and make the likely adversary fear exposure, is described in CPTED as which of the following?
Natural surveillance
Natural access control
Natural territorial reinforcement
Compartmentalization

A

Natural surveillance

46
Q

CPTED is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means. CPTED is a crime prevention theory grounded in environmental criminology. CPTED primarily focuses on which of the following PPS principles?
Deterrence
Detection
Delay
Response

A

Deterrence

47
Q

What are the steps in preventing repeat victimization?

A

Quickly remove signs of victimization
Improve physical security
Block easy access to targets
Protect especially vulnerable targets
Regulate access to high risk assets or areas

48
Q

What are the four main strategies of second generation CPTED?

A

Cohesion
Capacity threshold
Community Culture
Connectivity

49
Q

What is another name for the tipping point theory?

A

Capacity threshold

50
Q

What are the main lighting sources (lamp types)?

A

Incandescent
Halogen and quartz halogen
Fluorescent
Mercury vapor
Metal halide
High pressure sodium
Low pressure sodium
LED
Induction

51
Q

Which lamps have a poor rendition for video surveillance because of the blue light they cast?

A

Mercury vapor

52
Q

Which lamps have a poor rendition for video surveillance because of the blue light they cast?

A

Mercury vapor

53
Q

Which lamps are used at sports stadiums because they imitate daylight conditions and color appears natural and also work well with video surveillance systems?

A

Metal halide

54
Q

Which lamps suffer from poor color rendition but are used on streets and in parking lots as they allow to see more detail at greater distances in fog?

A

High pressure sodium

55
Q

Which are the lamps which have poor color rendition for video surveillance systems?

A

Mercury vapor
High pressure sodium
Low pressure sodium

56
Q

Which lamps are used mainly indoors which have a long life?

A

Induction

57
Q

Which light is invisible to naked eye but useful for video scene illumination?

A

Infrared lighting

58
Q

Which of the following lighting systems have the best color rendition for night lighting?

A

Metal halide

59
Q

A security practitioner is designing a PPS for a hospital parking garage and is considering security lighting to enhance the CCTV surveillance and monitoring. What is the BEST type of lighting to apply?

A

LED

60
Q

What are the characteristics that effect the security effectiveness of light use and lighting systems?

A

Quantity of lights
Level or intensitiy of light or illuminance
Light reflection of surrounding materials
Color temperature of the light

61
Q

What are the three main characteristics of intrusion sensor performance?

A

Probability of detection
Nuisance alarm rate
Vulnerability to defeat

62
Q

What are the factors on which the probability of detection relies?

A

target to be detected (e.g., walking/running/crawling intruder, tunneling, etc.), in addition to the direction and speed of target movement through the sensors’ pattern
sensor hardware design
installation conditions
sensitivity adjustment
weather conditions
condition of the equipment

63
Q

What are alarm initiation conditions?

A

Occurrence of a potential intrusion event. These are intrusion sensors.
A change in a safety or process condition being monitored (rise in temperature, presence of smoke, etc.). These are state sensors.
Loss of electrical power. These are fault event sensors.
Opening, shorting, or grounding of the device circuitry; tampering with the sensors; or changes in impedance on a circuit enclosure or distributed control panels (transponders). These are tamper sensors.
Failure of the sensor itself. This is another fault event that should be detected.

64
Q

What are the five characteristics that aid in the design and operation of an intrusion sensor system?

A

Probability of detection
Nuisance alarm rate
Vulnerabulity to defeat
Alarm initiation conditions
Operating conditions

65
Q

This detector absorbs invisible light energy comparing actual energy to established background energy. What type of detector is this?
Passive infrared
Active infrared
Active microwave
Passive microwave

A

Passive infrared

66
Q

This detector can use buried cable or transmitting and receiving signals relying on consistent reception of transmitted or reflected energy. When energy levels change due to a reflection or deflection, an alarm is transmitted. This is called _________ detection.

A

Microwave

67
Q

What are the uses of video surveillance?

A

Surveillance
Assessment
Forensics
Risk Mitigation

68
Q

What are the main elements of a video surveillance system?

A

Field of view
Scene
Lens
Camera
Transmission medium
Workstation
Recording equipment

69
Q

Which of the following statements best describes a CCTV’s field of view?
The location or area intended to be observed
The area visible through the camera lens
The view from the camera that is recorded
The function of CCTV which best controls color rendition

A

The area visible through the camera lens

70
Q

Which of the following BEST fits this description of this video surveillance component: “This determines the clarity and size of the field of view.”
The camera
The monitor
The recording equipment
The lens

A

The lens

71
Q

What questions should be asked to discern a video surveillance system’s functional requirements?

A

What is the purpose of the system?
What specifically is each camera supposed to view?
What are the requirements for proactive risk reduction, real time monitoring or recorded video?

72
Q

What are the four reasons to have cameras in security applications?

A

To obtain visual information about something that is happening
To obtain visual information about something that has happened
To deter or discourage undesirable activities
To use video analytics tools.

73
Q

What are the three identification views of VSS?

A

Subject identification
Action identification
Scene identification

74
Q

When selecting a VSS it is important to use a systems approach. True or False

A

True

75
Q

What are the two critical elements of AC&D system?

A

Transportation or communication of data
Presentation or display of that data to a human operator in a meaningful form.

76
Q

What are the AC&D Attributes?

A

Robustness is a measure of system performance in all probable environments.
The individual components should be reliable and have a long mean time between failures (MTBF).
Provide redundant or backup capability for critical components factoring in the possibility of failure.
Alarm information must be available to security personnel in a timely manner.
AC&D systems must be easy for an operator to use.

77
Q

When an alarm event occurs, what should AC&D system inform the operator?

A

Where the alarm has occurred
What or who caused the alarm
When the alarm happened
Response or action required

78
Q

What are the subsystems AC&D system is divided into?

A

communications, line supervision and security, information handling, control and display, assessment, and off-line subsystems.

79
Q

What characteristics drive the design of alarm communication systems?

A

Quantity of alarm data
High reliability needed for the system
Speed at which the data must be delivered

80
Q

Which of the following are outcomes of the planning phase? Select all that apply.
A set of security requirements or objectives
A risk assessment and risk mitigation plans
Procurement lists and purchase orders
The business case for the new or upgraded security systems

A

A set of security requirements or objectives.
The business case for the new or upgraded security systems

81
Q

Which of the following are outcomes of the planning phase? Select all that apply.
A set of security requirements or objectives
A risk assessment and risk mitigation plans
Procurement lists and purchase orders
The business case for the new or upgraded security systems

A

A set of security requirements or objectives.
The business case for the new or upgraded security systems

82
Q

These diagrams show complete security subsystems, including all the devices and how they are connected in a building or campus. They are called:
Details diagrams
Plan drawings
Elevation drawings
Riser Diagrams

A

Riser Diagrams

83
Q

Prepared during initial planning phase with a large contingency ( +/- 10 to 20%)
Budgetary estimate
Preliminary design estimate
Final design estimate

A

Budgetary estimates

84
Q

Developed at the 50% design review stage and normally has a contingency of + / - 10%
Budgetary estimate
Preliminary design estimate
Final design estimate

A

Preliminary design estimate

85
Q

Refined as the project advances to 100% completion with minimum contingency
Budgetary estimate
Preliminary design estiamte
Final design estimate

A

Final design estimate

86
Q

The actual cost of a security system is its __________

A

lifecycle cost

87
Q

When in the procurement stage, an invitation for bids (IFB) will list specific equipment and software and request prices from the contractors to supply the specific items and install them. This is BEST described as:
Design estimation
Design specification
Design planning
Design evaluation

A

Design specification

88
Q

In its simplest form, the lifecycle cost is the sum of __

A

the capital cost and the maintenance cost over the useful life of the system

89
Q

Typically the warranty cost and maintenance cost equals to _____% of the total capital systems construction costs.

A

11%

89
Q

Successful implementation of any physical security construction project requires a well-defined and executed procurement contract, as the lifecycle of implementing a typical system should take

A

18 to 24 months

90
Q

What is the testing conducted on a test system in advance of installation called?

A

Factory acceptance testing

91
Q

This type of testing demonstrates the completed system complies with contract requirements. What is it called?

A

Site acceptance testing

92
Q

Alternates testing and evaluation to allow for validation and corrective actions is called _______.

A

Reliability testing

93
Q

What affects the effectiveness of automated assessment tools?

A

Qualification of assessment personnel
Cost of assessment tools
Complexity of assessment software
Software’s inability to assess intangible factors and characteristics

94
Q

What are the four principal security strategies identified by most security designers?

A

Prevention
Detection
Control
Intervention

95
Q

Homeland security features five principal strategies. What are these?

A

Preparation
Prevention
Detection
Response
Recovery

96
Q

What are the four applications for security lighting?

A

Standby
Continuous
Movable
Emergency