PSP Domain 2 Application, Design, and Integration of Physical Security Systems Flashcards
What are the two foundational design principles?
The Four Ds and Layered security (aka Defense in Depth).
Sources: PSP, 5.1, page 74 POA, Physical Security, 5.1, page 76
The point where the delay time remaining exceeds the response force time is know as what?
Critical detection point.
Sources: PSP, 5.1, page 74 POA, Physical Security, 5.1, page 78
What is the term for the type of security where there is significant perimeter protection and entry is tightly controlled at a single portal?
Area security.
Sources: PSP, 5.1.1, page 75 POA, Physical Security, 5.1.1, page 79
What is the term for the type of security where the outer perimeter is loosely controlled and the primary security focus is at an individual building or restricted area within?
Point security.
Sources: PSP, 5.1.1, page 75 POA, Physical Security, 5.1.1, page 79
What are some conflicts that might arise in the design process for physical security measures?
Surveillance systems, sensors, door systems, and other physical security measures may conflict with one another: Safety and security objectives may not be the same; Security goals may not align with an organization’s mission or culture.
Sources: PSP, 5.1.2, page 75 POA, Physical Security, 5.1.2, page 79
What concept is used in the security design process to describe all aspects of a security system complementing and working with each other?
Balanced protection.
Sources: PSP, 5.1.3, page 76 POA, Physical Security, 5.1.3, page 80
What is a key factor in the nature of the physical security design and strategy employed to meet protection objectives?
The type or use of the facility or asset being protected.
Sources: PSP, 5.1.4, page 77 POA, Physical Security, 5.1.4, page 81
What are the two types of design criteria?
Performance criteria (elements chosen for their contribution to performance),Feature criteria (elements chosen because certain features are required). Sources: PSP, 5.1.4, page 78 POA, Physical Security, page 83
What type of design process selects elements and procedures according to the contribution they make to overall system performance?
Performance criteria.
Sources: PSP, 5.1.4, page 78 POA, Physical Security, 5.1.4, page 83
What type of design process selects elements or procedures to satisfy requirements that certain items be present?
Feature criteria.
Sources: PSP, 5.1.4, page 78 POA, Physical Security, page 83
What are the five different aspects that need to be taken into account when developing security system procedures?
People,Operations,Maintenance, Training & awareness, Incident based & exploratory investigations.
Sources: PSP, 5.1.4, page 79 POA, Physical Security, 5.1.4, page 84
What are the nine basic factors to know from the onset in security design?
Governing codes and regulations,Protection requirements,Company standards and guidelines, Type of construction, Site layout, Material selection, Utilities, Life safety, Infrastructure.
Sources: PSP, 7.1, page 99 POA, Physical Security, 7.1, page 105
What equation is used for calculating risk when developing a design?
Risk = Vulnerability x Threat x Asset Value
Sources: PSP, 7.3, page 100 POA, Physical Security, 7.3, page 106
According to the U.S. Federal Emergency Management Agency (FEMA) model, what are the two basic classifications of threats or hazards?
Natural and human-caused.
Sources: PSP, 7.3, page 100 POA, Physical Security, 7.3, page 106
What is the design basis threat (DBT)?
A profile of the type, composition, capabilities, and methods (tactics, techniques, and procedures), as well as the goals, intent, and motivation of an adversary, upon which the security engineering and operations of a facility are based.
Source: POA, Physical Security, 7.3, page 106
What is a requirements document?
A requirements document identifies the primary reasons for implementing new measures or upgrading an old system. It is closely tied to the risk assessment by identifying the specific security measures to mitigate threats and reduce vulnerabilities.
Source: IPPS , Chapter 4, page 63
The collection, review and analysis of data relative to the facility where the system will be implemented is an integral part of which process?
Planning process.
Source: IPPS, Chapter 4, page 64
What are the two important criteria in developing the objectives for implementing or upgrading the physical protection system (PPS)?
The objective must be clearly stated and it must be SMART.
Source: IPPS, Chapter 4, page 66
What does SMART stand for?
Specific, Measurable, Aggressive but achievable, Realistic, Time-bounded (Source: IPPS)
Specific, Measurable, Attainable, Repeatable, Time-dependent (Source: PSP)
Other variations on these initials maintain the essential idea: that objectives be clear, focused, and appropriate to the task.
Source: IPPS, Chapter 4, page 66, and PSP, 4.1.2, page 5
What are some influencing characteristic factors to consider in physical security design?
Assests under protection,Buiding or facility type,Surroundings, Location, Additional concerns, such as senior management support.
Sources: PPS, Chapter 6, pages 89-95 POA, Physical Security, Chapter 6, pages 95-101
According to CPTED security layering, where is the first layer of security?
The first layer should be at the perimeter of the property.
Source: PAP Standard, A.3.3, page 33
According to CPTED security layering, where is the second layer of security?
The second layer should be at the building exterior.
Source: PAP Standard, A.3.3, page 33
According to CPTED security layering, which layers are inside the building?
The third, fourth, and fifth layers.The third layer should segregate authorized and unauthorized visitors.The fourth layer should segregate generally accessible client areas from staff-only areas. The fifth layer should further restrict staff access to highly sensitive areas.
Source: PAP Standard, A.3.3, page 33
What is crime prevention through environmental design (CPTED)?
An approach to reducing crime or security incidents through the strategic design of the built environment, typically employing organizational, mechanical, and natural methods to control access, enhance natural surveillance and territoriality, and support legitimate activity.
Source: PAP Standard, 3.14, page 2