PSP Study Guide Chpt 1-2 Flashcards

1
Q

List the Four D’s of physical security

A

Deter, Detect, Delay, Deny (Doss, Page 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This concept relies on multiple layers of concentric security features that provide 360 degree protection without gaps and weaknesses.

A

Defense-in-Depth (Doss, Page 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In order for detection to be successful, what must also be allowed to occur?

A

Assessment (Doss, Page 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the six examples of Exterior Perimeter protection as illustrated by Defense-in-Depth:

A

Lighting, fencing, bollards, gates, walls, intrusion detection (Doss, Page 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the four examples of policies and procedures as demonstrated in the Defense-in-Depth model:

A

Visitor Policies, Mailroom controls, onsite delivery procedures, password controls (Doss, Page 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the nine examples of Interior Perimeter protection as demonstrated in the Defense-in-Depth model:

A

Reception areas, Walls, doors, windows, access control, IT data room and firewalls, Emergency systems, CCTV, Intrusion detection. (Doss, Page 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At what layer in the defense-in-depth model is the property defined? What else happens at this location?

A

Outer layer - in addition to defining the boundary of the property, this layer channels both people and vehicles to designated access points. (Doss, Page 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Typically the asset is kept within which of the three layers in the defense-in-depth model?

A

Interior (Doss, Page 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What four things should be considered to calculate the effectiveness of the physical security features?

A

ID the asset needing protection, the skill of the adversary, the tools and tactics of the adversary and the pathway of travel needed to be taken by the adversary (Doss, Page 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The result of the analysis used to calculate the effectiveness of the physical security features is called what?

A

Design Basis Threat (DBT), (Doss, Page 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the point where the delay time exceeds the response force time called?

A

Critical Detection Point (CDP), (Doss, Page 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What five elements should be considered in the concept of design?

A

Facility layout and utilization, Protection strategy, Structural and electronic security systems, Security office operations and other human support, Physical security program management. (Doss, Page 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Finish the sentence; The PPS should be balanced between the…

A

…various forms of security measures (structural, electronic, procedural) to be effective. (Doss, Page 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The objective of a PPS is to provide adequate protection against all DBT’s and to maintain a balance between what four things?

A

Cost, Safety, Mission and Culture (Doss, Page 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Point Security

A

Any site where the outer perimeter is loosely controlled with primary focus on individual buildings within the perimeter of spaces within the buildings, such as restricted areas. (Doss, Page 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which criteria is based on the contribution that a subsystem or component makes to the overall PPS performance?

A

Performance Criteria (Doss, Page 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or False - Feature based criteria is the best way to verify the design criteria of the PPS design.

A

False - Performance criteria is better because it measures the performance of the actual subsystem or component. Feature based criteria relies on features, not actual performance. (Doss, Page 5).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which is it - feature or performance based criteria? A fence sensor is installed and is operational?

A

Feature (Doss, Page 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three main contemporary challenges to security services?

A

Standards and guidelines, emerging technology, security education (Doss, Page 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False - Security personnel are the lowest cost line item in the security budget.

A

Fales - they are the most expensive (Doss, Page 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the three behavior aspects security officers should possess?

A

Courtesy, Restraint, Interest (Doss, Page 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the three tasks that a security officer must perform?

A

Protect property, enforce rules, direct pedestrian and vehicular traffic. (Doss, Page 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This type of log is kept to show events as they occurred in chronological order.

A

Post log or incident log (Doss, Page 8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Is it acceptable to write a log entry in pencil?

A

No - pen only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Is it acceptable to write a log entry in pencil?

A

No - pen only.(Doss, Page 8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

These reports may be required to document specific issues and inform leadership.

A

Formal written reports (Doss, Page 9)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

True or false - A hybrid model of contract and proprietary security officers is the best way to combat paying overtime to security personnel.

A

True (Doss, Page 9)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When choosing to arm security officers, what five responsibilities is organizational management responsible for?

A

Training, Choosing appropriate firearms and ammunition, Ensuring proper maintenance is performed by a qualified gunsmith, Ensuring maintenance records are kept to date, Purchasing adequate insurance. (Doss, Page 10)

29
Q

List the three distinct domains of learning:

A

Cognitive, Affective, Psychomotor learning (Doss, Page 11)

30
Q

Knowledge of theory applied to practice is called…

A

Cognitive Learning (Doss, Page 11)

31
Q

Phsyical skills / hands on training is called…

A

Psychomotor learning (Doss, Page 11)

32
Q

Professional expertise can be summarized on the following equation:

A

Education + Training + Guided Experience = Development (Doss, Page 11)

33
Q

These are most effective when delivered in a forum that allows for active group conversation.

A

Case Studies (Doss, Page 11)

34
Q

One of the biggest issues with training is:

A

The Cost (Doss, Page 12)

35
Q

Define Frog Syndrome

A

When a manager starts a training program by personal instruction and then jumps out when they have to much other work to do. (Doss, Page 12)

36
Q

These orders are bodies of principles for the security officer:

A

General Orders (Doss, Page 12)

37
Q

These orders may be developed to address special events such as a board meeting, holiday party, or public function.

A

Special Orders (Doss, Page 12)

38
Q

Post orders are also know as what?

A

Standard Operating Procedures (Doss, Page 13)

39
Q

These orders list officer duties, explain policies and procedures and provide a basis for training.

A

Post or SOP (Doss, Page 13)

40
Q

These are statements of a principle that each employee must follow while performing business functions.

A

Policies (Doss, Page 13)

41
Q

What four areas do policies address?

A

People, Property, Information and General objectives (Doss, Page 13)

42
Q

These are detailed instructions on how to perform daily work, often using a step-by-step process or written list of duties:

A

Procedures (Doss, Page 14)

43
Q

True or False - Polocies change more than procedures.

A

False. Procedures change more often to meet changing demands and conditions that are used to carry out security policies. (Doss, Page 14)

44
Q

What three areas do procedures address:

A

People (threats, evacuations, visitor management and employee access), Property (securing assets, marking property, key issuance), Information (marking, storage and destruction of information and technical surveillance countermeasures) (Doss, Page 14)

45
Q

What are the two measurable performance categories for security officers?

A

Response and Training (Doss, Page 14)

46
Q

What metric would be best used when examining evidence for the reputation of the security function and how many resources are needed to perform their duties?

A

Response to customer requests (Doss, Page 15)

47
Q

This metric would be used to examine the time it takes security officers to respond to alarms.

A

Guard Force Response (Doss, Page 15)

48
Q

Which metric would you use if you wanted to examine a daily activity like badge issuance?

A

Security Related Activities (Doss, Page 15)

49
Q

These are metrics that the security department documents when providing training to others within the organization.

A

Outward Facing Training Metrics (Doss, Page 15)

50
Q

Inward facing training metrics cover what?

A

They cover the training required for the performance of the officers duties. (Doss, Page 15)

51
Q

What term applies to the situation where an officer is the immediate cause of an injury to a victim?

A

Proximate Cause (Doss, Page 16)

52
Q

When officers engage in unreasonable conduct it is called:

A

Breach of duty. (Doss, Page 16)

53
Q

Events, or actions, that can cause loss, harm or damage that are known or should have been know are an example of:

A

Foreseeability (Doss, Page 16)

54
Q

When officers engage in conduct beyond their duties.

A

Failure to Adhere to Duty Guidelines (Doss, Page 16)

55
Q

This can be defined as the systematic approach that identifies risk, calculates the impact of the risk and eliminates or minimizes the risk to an acceptable level.

A

Risk Management (Doss, Page 21)

56
Q

List the six steps for of the risk assessment process:

A

Identify and value assets
Identify threats
Determine vulnerabilities
Determine the impact of a loss event
Analysis and prioritization
Use a mitigation baseline approach
(Doss, Page 21)

57
Q

What are the three categories that assets can be divided into?

A

Tangible
Intangible
Mixed
(Doss, Page 22)

58
Q

A loss of market share and poor public relations are examples of what?

A

Indirect costs (Doss, Page 22-23)

59
Q

What are the two methods used to express a value of an asset?

A

Relative and Cost of Loss (Doss, Page 23)

60
Q

Fill in the blanks on the equation: ___ x Threat Likelihood x Severity (impact) x _____ = _____

A

Asset Value, Vulnerability = Security Risk Rating (Doss, Page 23)

61
Q

How are relative values expressed and to what scale?

A

Based on priority and are expressed on a scale of 1-5 (low to high) (Doss, Page 23)

62
Q

What does Cp, Ct and Cr mean in a cost of loss formula?

A

Cp = permanent replacement cost, Ct - temporary replacement cost, Cr = related costs (removal, operational impact etc) (Doss, Page 23)

63
Q

How is lost income demonstrated in the cost of loss formula?

A

Ci (Doss, Page 23)

64
Q

What does I and K stand for in the Cost of Loss formula?

A

I = insurance and K = total cost of the loss (Doss, Page 23)

65
Q

A _____ is a contributing factor to a peril.

A

hazard (Doss, Page 23)

66
Q

What are the three types of threat categories?

A

Natural, Intentional (Man-made), Inadvertent (accidents, errors, omissions) (Doss, Page 24)

67
Q

When it comes to physical security planning for threat, an ____________ should be taken to ensure all risk is accounted for.

A

All-Hazards-Approach (Doss, Page 24)

68
Q

A ___________ is a gap or weakness that allows a threat to compromise an asset or function.

A

Vulnerability (Doss, Page 24)

69
Q

What is the difference between a vulnerability and a threat?

A