PSP Domain 2 Application, Design, and Integration of Physical Security Systems Flashcards
What are the two foundational design principles?
The Four Ds and Layered security (aka Defense in Depth).
Sources: PSP, 5.1, page 74 POA, Physical Security, 5.1, page 76
The point where the delay time remaining exceeds the response force time is know as what?
Critical detection point.
Sources: PSP, 5.1, page 74 POA, Physical Security, 5.1, page 78
What is the term for the type of security where there is significant perimeter protection and entry is tightly controlled at a single portal?
Area security.
Sources: PSP, 5.1.1, page 75 POA, Physical Security, 5.1.1, page 79
What is the term for the type of security where the outer perimeter is loosely controlled and the primary security focus is at an individual building or restricted area within?
Point security.
Sources: PSP, 5.1.1, page 75 POA, Physical Security, 5.1.1, page 79
What are some conflicts that might arise in the design process for physical security measures?
Surveillance systems, sensors, door systems, and other physical security measures may conflict with one another: Safety and security objectives may not be the same; Security goals may not align with an organization’s mission or culture.
Sources: PSP, 5.1.2, page 75 POA, Physical Security, 5.1.2, page 79
What concept is used in the security design process to describe all aspects of a security system complementing and working with each other?
Balanced protection.
Sources: PSP, 5.1.3, page 76 POA, Physical Security, 5.1.3, page 80
What is a key factor in the nature of the physical security design and strategy employed to meet protection objectives?
The type or use of the facility or asset being protected.
Sources: PSP, 5.1.4, page 77 POA, Physical Security, 5.1.4, page 81
What are the two types of design criteria?
Performance criteria (elements chosen for their contribution to performance),Feature criteria (elements chosen because certain features are required). Sources: PSP, 5.1.4, page 78 POA, Physical Security, page 83
What type of design process selects elements and procedures according to the contribution they make to overall system performance?
Performance criteria.
Sources: PSP, 5.1.4, page 78 POA, Physical Security, 5.1.4, page 83
What type of design process selects elements or procedures to satisfy requirements that certain items be present?
Feature criteria.
Sources: PSP, 5.1.4, page 78 POA, Physical Security, page 83
What are the five different aspects that need to be taken into account when developing security system procedures?
People,Operations,Maintenance, Training & awareness, Incident based & exploratory investigations.
Sources: PSP, 5.1.4, page 79 POA, Physical Security, 5.1.4, page 84
What are the nine basic factors to know from the onset in security design?
Governing codes and regulations,Protection requirements,Company standards and guidelines, Type of construction, Site layout, Material selection, Utilities, Life safety, Infrastructure.
Sources: PSP, 7.1, page 99 POA, Physical Security, 7.1, page 105
What equation is used for calculating risk when developing a design?
Risk = Vulnerability x Threat x Asset Value
Sources: PSP, 7.3, page 100 POA, Physical Security, 7.3, page 106
According to the U.S. Federal Emergency Management Agency (FEMA) model, what are the two basic classifications of threats or hazards?
Natural and human-caused.
Sources: PSP, 7.3, page 100 POA, Physical Security, 7.3, page 106
What is the design basis threat (DBT)?
A profile of the type, composition, capabilities, and methods (tactics, techniques, and procedures), as well as the goals, intent, and motivation of an adversary, upon which the security engineering and operations of a facility are based.
Source: POA, Physical Security, 7.3, page 106
What is a requirements document?
A requirements document identifies the primary reasons for implementing new measures or upgrading an old system. It is closely tied to the risk assessment by identifying the specific security measures to mitigate threats and reduce vulnerabilities.
Source: IPPS , Chapter 4, page 63
The collection, review and analysis of data relative to the facility where the system will be implemented is an integral part of which process?
Planning process.
Source: IPPS, Chapter 4, page 64
What are the two important criteria in developing the objectives for implementing or upgrading the physical protection system (PPS)?
The objective must be clearly stated and it must be SMART.
Source: IPPS, Chapter 4, page 66
What does SMART stand for?
Specific, Measurable, Aggressive but achievable, Realistic, Time-bounded (Source: IPPS)
Specific, Measurable, Attainable, Repeatable, Time-dependent (Source: PSP)
Other variations on these initials maintain the essential idea: that objectives be clear, focused, and appropriate to the task.
Source: IPPS, Chapter 4, page 66, and PSP, 4.1.2, page 5
What are some influencing characteristic factors to consider in physical security design?
Assests under protection,Buiding or facility type,Surroundings, Location, Additional concerns, such as senior management support.
Sources: PPS, Chapter 6, pages 89-95 POA, Physical Security, Chapter 6, pages 95-101
According to CPTED security layering, where is the first layer of security?
The first layer should be at the perimeter of the property.
Source: PAP Standard, A.3.3, page 33
According to CPTED security layering, where is the second layer of security?
The second layer should be at the building exterior.
Source: PAP Standard, A.3.3, page 33
According to CPTED security layering, which layers are inside the building?
The third, fourth, and fifth layers.The third layer should segregate authorized and unauthorized visitors.The fourth layer should segregate generally accessible client areas from staff-only areas. The fifth layer should further restrict staff access to highly sensitive areas.
Source: PAP Standard, A.3.3, page 33
What is crime prevention through environmental design (CPTED)?
An approach to reducing crime or security incidents through the strategic design of the built environment, typically employing organizational, mechanical, and natural methods to control access, enhance natural surveillance and territoriality, and support legitimate activity.
Source: PAP Standard, 3.14, page 2
What are the three classifications to CPTED strategies?
Mechanical measures, Organizational measures,Natural or architectural measures.
Source: PAP Standard, A.3.1, page 31
What is natural surveillance?
A CPTED strategy to increase visibility, both interior-to-exterior and exterior-to-interior, to increase witness potential, foster a sense of exposure to the criminal element, and give advance visibility to areas people are entering.
Source: PAP Standard, A.3.2, page 32
What is the ‘broken windows’ theory?
This theory suggests that an abandoned building or car can remain unmolested indefinately, but once the first window is broken, the building or car is quickly vandalized.
Source: POA, Physical Security, 10.1, page 213
What is compartmentalization?
A CPTED strategy to design multiple or concentric layers of security measures so that highly protected assets are behind multiple barriers. This is also known as protection-in-depth.
Source: PAP Standard, A.3.3, page 32
What are the four levels of integration?
Integrated electronic security systems,Integrated physical security elements,Integrated security programs, Integration in enterprise risk management.
Sources: PSP, Chapter 8 Introduction, page 120 POA, Physical Security, Chapter 8 Introduction, page 127
A successful security design integrates what three primary elements?
Architectural aspects, Security systems, Operational factors.
Source: POA, Physical Security, 8.3, page 131
What does PSIM stand for?
Physical security information management.
Sources: PSP, 8.4, page 127 POA, Physical Security, 14.7.1, page 520
What involves planning, organizing and controlling resources on a project?
Project management.
Sources: PSP, Chapter 13, page 437 POA, Physical Security, Chapter 13, page 471
What are four constraints on a project?
Project scope, Schedule,Budget, Quality.
Source: POA, Physical Security, Chapter 13, page 472
What are typical elements in the project management process for a physical protection system (PPS)?
Project concept, Designing the project, Managing the bid process, Managing the implementation process, Acceptance of work, Initializing and managing the warranty process.
Sources: PSP, Chapter 13, pages 441-442 POA, Physical Security, Chapter 13, pages 476-477
What are the two first phases of system design principles?
Planning and assessment.
Source: POA, Physical Security, 14.1, page 479
Technical security projects typically progress through which six tasks?
Risk analysis, Conceptual (schematic),Design development, Construction documents, Bidding, Construction.
Source: POA, Physical Security, 14.1, page 481
What is stand-off distance?
The distance between a critical asset and the nearest point of attack.
Source: PAP Standard, A.4.2, page 36
What are the five basic tasks of physical protection system (PPS) implementation?
Conducting planning and assessment to determine security requirements;Developing conceptual solutions for resolving vulnerabilities;Preparing PPS design and construction documentation; Soliciting bids and conducting pricing and vendor negotiations; Installing, testing, and commissioning the PPS.
Source: POA, Physical Security, Chapter 13, page 475
What is the term used to describe the outcome of the overall planning phase through a set of security requirements or objectives that is used as a basis of the eventual design?
Design basis.
Sources: PSP, 14.2, page 446 POA, Physical Security, 14.2, page 482
The ground rules and guidelines for the design are referred to as what?
Design criteria.
Sources: PSP, 14.3.1, page 449 POA, Physical Security, 14.3.1, page 485
What are the two phases in design and documentation?
Design development stage, Construction documents phase
Sources: PSP, 14.3.4, page 455 POA, Physical Security, 14.3.4, page 491
What are the three sections of the procurement documents that are also known as contract (or bid) documents?
Contractual details, Construction specifications, Construction drawings.
Sources: PSP, 14.3.4, page 455 POA, Physical Security, 14.3.4, page 492
The construction document (CD) phase includes what five items?
CD drawings,Specifications,Bill of quantities, Refined system budgets, Contract terms & Conditions.
Sources: PSP, 14.3.4, page 456 POA, Physical Security, 14.3.4, page 493
What are the results of detailed specifications?
Final implementation reflects what was intended,All bidders get same complete understanding of requirements.
Sources: PSP, 14.3.5, pages 456-457 POA, Physical Security, 14.3.5, pages 493-494
What does CADD stand for?
Computer-aided design drafting.
Sources: PSP, 14.3.6, page 458 POA, Physical Security, 14.3.6, page 495
The table of related security devices is commonly known as what?
Hardware schedules.
Sources: PSP, 14.3.6, page 462 POA, Physical Security, 14.3.7, page 499
What are the three types of cost estimates?
Budgetary, Preliminary design, Final design.
Sources: PSP, 14.4.3, pages 466-467 POA, Physical Security, 14.4.3, pages 504-506
What are the two possibilities for who will design the system?
Customer or end user, Contractor or integrator.
Source: IPPS, Chapter 4, pages 66-67
An approximation of the cost of each alternative security solution prepared for budgeting & planning purposes is known as what?
Budgetary estimates.
Source: IPPS, Chapter 4, page 67
What are the three different types of project estimates?
Budgetary, Preliminary design, Life cycle cost.
Source: IPPS, Chapter 5, pages 85-86
What are the seven procedures to be covered when creating a detailed estmate?
Identify PPS subsystem,Identify other installation activities,Develop list of components,Establish component prices,Formulate installation crews & establish productivity,Identify required special equipment & rates,Use spreadsheet format.
Source: IPPS, Chapter 5, pages 88-89
Project scope document should have what 10 sections?
Executive summary,Project benefits,Project objectives,Project scope,Estimated project hours,Estimated cost,Estimated duration,Assumptions,Major risks,Objectives.
Source: IPPS, Chapter 3, pages 34-36
What are the four stages of a project?
Project feasibility,Project development,Project execution,Project closeout.
Source: IPPS, Chapter 3, pages 36-37
In which stage of the project should any changes to the project scope, deliverables, or activities be subject to a more systematic change process and submitted to a change review board (CRB)?
Stage 3- Project execution.
Source: IPPS, Chapter 3, pages 43-45
What are the seven deliverables of the planning stage?
Risk assessment report,Procurment method,Budgetary estimate,Selection of project manager,Selection of project team,Design criteria,Contracting & Legal requirements.
Source: IPPS, Chapter 4, pages 67-68