PSP Study Guide Chpt 1-2 Flashcards
List the Four D’s of physical security
Deter, Detect, Delay, Deny (Doss, Page 2)
This concept relies on multiple layers of concentric security features that provide 360 degree protection without gaps and weaknesses.
Defense-in-Depth (Doss, Page 3)
In order for detection to be successful, what must also be allowed to occur?
Assessment (Doss, Page 2)
List the six examples of Exterior Perimeter protection as illustrated by Defense-in-Depth:
Lighting, fencing, bollards, gates, walls, intrusion detection (Doss, Page 3)
List the four examples of policies and procedures as demonstrated in the Defense-in-Depth model:
Visitor Policies, Mailroom controls, onsite delivery procedures, password controls (Doss, Page 3)
List the nine examples of Interior Perimeter protection as demonstrated in the Defense-in-Depth model:
Reception areas, Walls, doors, windows, access control, IT data room and firewalls, Emergency systems, CCTV, Intrusion detection. (Doss, Page 3)
At what layer in the defense-in-depth model is the property defined? What else happens at this location?
Outer layer - in addition to defining the boundary of the property, this layer channels both people and vehicles to designated access points. (Doss, Page 4)
Typically the asset is kept within which of the three layers in the defense-in-depth model?
Interior (Doss, Page 4)
What four things should be considered to calculate the effectiveness of the physical security features?
ID the asset needing protection, the skill of the adversary, the tools and tactics of the adversary and the pathway of travel needed to be taken by the adversary (Doss, Page 4)
The result of the analysis used to calculate the effectiveness of the physical security features is called what?
Design Basis Threat (DBT), (Doss, Page 4)
What is the point where the delay time exceeds the response force time called?
Critical Detection Point (CDP), (Doss, Page 4)
What five elements should be considered in the concept of design?
Facility layout and utilization, Protection strategy, Structural and electronic security systems, Security office operations and other human support, Physical security program management. (Doss, Page 5)
Finish the sentence; The PPS should be balanced between the…
…various forms of security measures (structural, electronic, procedural) to be effective. (Doss, Page 5)
The objective of a PPS is to provide adequate protection against all DBT’s and to maintain a balance between what four things?
Cost, Safety, Mission and Culture (Doss, Page 5)
Define Point Security
Any site where the outer perimeter is loosely controlled with primary focus on individual buildings within the perimeter of spaces within the buildings, such as restricted areas. (Doss, Page 5)
Which criteria is based on the contribution that a subsystem or component makes to the overall PPS performance?
Performance Criteria (Doss, Page 5)
True or False - Feature based criteria is the best way to verify the design criteria of the PPS design.
False - Performance criteria is better because it measures the performance of the actual subsystem or component. Feature based criteria relies on features, not actual performance. (Doss, Page 5).
Which is it - feature or performance based criteria? A fence sensor is installed and is operational?
Feature (Doss, Page 5)
What are the three main contemporary challenges to security services?
Standards and guidelines, emerging technology, security education (Doss, Page 5)
True or False - Security personnel are the lowest cost line item in the security budget.
Fales - they are the most expensive (Doss, Page 6)
What are the three behavior aspects security officers should possess?
Courtesy, Restraint, Interest (Doss, Page 6)
What are the three tasks that a security officer must perform?
Protect property, enforce rules, direct pedestrian and vehicular traffic. (Doss, Page 7)
This type of log is kept to show events as they occurred in chronological order.
Post log or incident log (Doss, Page 8)
Is it acceptable to write a log entry in pencil?
No - pen only.
Is it acceptable to write a log entry in pencil?
No - pen only.(Doss, Page 8)
These reports may be required to document specific issues and inform leadership.
Formal written reports (Doss, Page 9)
True or false - A hybrid model of contract and proprietary security officers is the best way to combat paying overtime to security personnel.
True (Doss, Page 9)