PSP Study Guide Words Flashcards
Adhering to duty guidelines
Officers must conform to set standard of conduct that do not go beyond their established duties
Breach of Duty
officers that engage in unreasonable illegal conduct
Foreseeability
events which cause loss, harm or damage that should have been known prior to the event happening
intentionally tort
a wrong committed with intent to cause harm to property or people
Tort
certain wrongful conduct that causes physical injury, interferes with one’s physical security, freedom of movement, property damage, or property loss. Tort actions are civil causes where one person brings a personal suit against another, seeking monetary compensation
Imputed negligence
negligence of one party can be charged to another based upon an existing relationship between parties.
Intentional Tort
a wrong committed with the intent to cause harm to property or people
Liability
something for which one is legally obliged, an obligation, responsibility or debt
Negligence
failure to exercise the degree of care considered reasonable under the circumstances, resulting in an unintendted injury to another party
Non-delegable duty
some obligations of the organization cannot be entirely transferred
Negligent Tort
a wrong committed through failure to excercise sufficient care in doing what is otherwise permissible
The Teft Triangle
3 factors present for theft to occurr: Motive, Desire, Opportunity
Three principles of CPTED
Territoriality, Natural Surveillance, Defensible Space
Territoriality
property design that creates a psychological barrier
Natural Surveillance
to be able to witness criminal acts or detect unusual acitvity through clear sight lines
Compensatory damages
Actual damages related to the amount of the loss
Defensible Space
security measures and property designs that allow for the control of the environment. natural access control, video surveillance
Punitive damages
Designed to punish the defendant and to deter him from repetition of the wrongful act
Risk Analysis
An assessment done that looks at problem identification and probability determination. Methods for estimating the expected loss from an occurrence of some adverse event
Cost benefit analysis
A comparison of the security unit operation costs and all security measures compared to the amount of corporate property saved or recovered including any reduction of losses caused by injuries and lost productivity
Cost benefit ratio
Helps determine efficiency or effectiveness versus cost. Three concepts: cost, reliability, delay
Information Security
Protection of info and it’s critical elements, including the systems and hardware that use, store and transmit the info
Information Systems
Computer based info processing systems
Internal Controls ( computers)
Procedures designed to control the operation of computer systems, controls over the configuration, changes to programs without approval and controlling administrative privileges
Defensible space
Includes territoriality and natural surveillance. Living environment must be opened up and used by residents. Stimulates self policing
Site design
Clustering of small numbers of residential units around private hallways, courtyards
Predictability
Percentage of chance that one can predict that upcoming events are likely to cause great security risks. Indicator of behaviour
Probability
Reflects what is historically known. Likelihood of incident taking place based on past incidents
Convenience
The more hard lined security is the less convenient it is for perp to take chance on committing crime
Building inspection
Used to advise a tenant of their vulnerabilities as they pertain to physical characteristics of dwelling
Security survey
Encompasses the entire complex in contrast to only a portion of the site
Documents used to id risk. Comprised do data collected by security personnel
ID facts, gaps or inefficiencies and overall security needs and provide recommendations to mitigate risk
Security analysis
More in depth study, includes risk management , analysis of risk factors, environmental measures, analysis of crime patterns, fraud and internal theft
Minimum security
Designed to impede some unauthorized external activity
Low level security
Designed to impede and detect some unauthorized external activity
Medium security
Designed to impede, detect and access most unauthorized external and some unauthorized internal activity
High level security
Designed to impede, detect and assess most unauthorized external and internal activity
Maximum security
Design to impede, detect, assess and neutralize all unauthorized external and internal activity
Chain-linked fencing
Constructed of 7ft material excluding top guard
Must be of 9 gauge or heavier
4 sq. in. Or smaller openings
Twisted and barbed salvage at top and bottom
Secured to rigid metal or reinforced concrete posts set in concrete
Posts 10’ or less apart
Must reach within 2” of hard ground. Soft ground - reach deep enough to compensate for shifting soil or sand
All bolts and nuts holding hardware should be welded
Ward lock
Longest in use and first developed
Lever lock
Came after warded in 18th century. Offered more security than warded
Pin Tumbler lock
Consists of : the pin, a driver or separate metal cylinder, and a spring
Attack methods- drilling or punching
Breaking off combination dial and drilling a hole to the exposed locking device
Attack methods- burning
Use of high temp torches to cut opening in wall or door
Attack methods- pealing
Attack the seams of the vault, using tools to expose locking mechanism or interior
Incandescent
Produces light by using electric current to heat a filament. Instant on Low initial cost Compact Short life High heat outpu Inefficient
Quartz- Quartz halogen
Incandescent bulbs with halogen gas
Good color rendition
High heat output
Inefficient
Fluorescent
Pass electricity through a gas enclosed tube to create light
Create 2Xs the light and half the heat of incandescent
Long life
Efficient
Temp sensitive
Mercury Vapor
High intensity discharge device which produces light by excitation of mercury vapours. Emits blueish white light. Long life Low initial cost Delayed hot restart Inefficient operation
Metal halide
High intensity discharge arc tube which light is produced by the radiation of excited metal halides. Excellent color rendition Imitates daylight Works well with CCTV Restart can take several minutes High initial cost High maintenance cost
High pressure sodium
High intensity discharge arc tube which light is produced by radiation from sodium Vapor operating under pressure Very efficient Good in fog Hot restart takes several minutes High initial cost
Low Pressure Sodium
High intensity discharge arc tube which light is produced from sodium Vapor operating under pressure
Very efficient
Poor color rendition
Expensive to maintain
Barbed wire
7' height Post not more than 6' apart 12 gauge twisted double strand 6" max between strands Vertical wire midway between posts
PPS consist of Three elements
Architectural, Operational, Security systems
Architectural
Barriers, locks, exterior, interior lighting, critical building services, space layout, parking, adjacent buildings
Operational
Organization and staffing, policies, procedures, training, visitot control, guard staffing, emergency response
Security Systems element
Automated access control, intrusion detection systems, alarm systems, CCTV, comms,
Three types of measure in PPS
Preventative, Corrective, Detective
Preventative
Reduce likelihood of a deliberate attack, deter an attack, introduce delays, reduce vulnerabilities, deny the attack to be successful
Corrective
Reduce the effects of an attack and restore the facility to normal ops
Detective
Distinguish between authorized and unauthorized personnel, help discover attacks, and trigger appropriate preventative or corrective measures
Probability
The study of possibility of occurrence
ALE annual Loss Expectancy
Calculation of impact and frequency
ALE= 10(f+i-3)/ 3
I= cost valuation (impact) of the event= single loss expectancy (sle)
f= estimated frequency of the event = annual rate of occurrence (ARO)
Criticality during a cost analysis
Prevention- I’d threat before it can get started
Control- I’d how threat event might be kept from impacting specific assets
Recovery- how the operation will be restored after the threat
Cost-Benefit ratio
Determines the efficiency or effectiveness versus cost 3 concepts that make up ratio: Cost Reliability Delay
VSAT- vulnerability Self Assessment Tool
Tool to help develop PPSs. Protects specific targets from specific threats
ID assets ID thReats Determine criticality ID existing countermeasures Determine risk level Determine probability of failure Assign vulnerability Determine if risk is acceptable Develop new countermeasures Perform risk-cost analysis Develop BCP
CARVER
Vulnerabilities from attacker POV
Criticality - how important the target is
Accessibility- ease do access to the target
Recoverability-ability to recover from an attack
Vulnerability-ease of attack on target successfully
Effects-direct loss from attack
Recognizability- ease of target recognition