PSP Study Guide Words Flashcards

1
Q

Adhering to duty guidelines

A

Officers must conform to set standard of conduct that do not go beyond their established duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Breach of Duty

A

officers that engage in unreasonable illegal conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Foreseeability

A

events which cause loss, harm or damage that should have been known prior to the event happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

intentionally tort

A

a wrong committed with intent to cause harm to property or people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tort

A

certain wrongful conduct that causes physical injury, interferes with one’s physical security, freedom of movement, property damage, or property loss. Tort actions are civil causes where one person brings a personal suit against another, seeking monetary compensation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Imputed negligence

A

negligence of one party can be charged to another based upon an existing relationship between parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intentional Tort

A

a wrong committed with the intent to cause harm to property or people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Liability

A

something for which one is legally obliged, an obligation, responsibility or debt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Negligence

A

failure to exercise the degree of care considered reasonable under the circumstances, resulting in an unintendted injury to another party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-delegable duty

A

some obligations of the organization cannot be entirely transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Negligent Tort

A

a wrong committed through failure to excercise sufficient care in doing what is otherwise permissible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Teft Triangle

A

3 factors present for theft to occurr: Motive, Desire, Opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Three principles of CPTED

A

Territoriality, Natural Surveillance, Defensible Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Territoriality

A

property design that creates a psychological barrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Natural Surveillance

A

to be able to witness criminal acts or detect unusual acitvity through clear sight lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compensatory damages

A

Actual damages related to the amount of the loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Defensible Space

A

security measures and property designs that allow for the control of the environment. natural access control, video surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Punitive damages

A

Designed to punish the defendant and to deter him from repetition of the wrongful act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risk Analysis

A

An assessment done that looks at problem identification and probability determination. Methods for estimating the expected loss from an occurrence of some adverse event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cost benefit analysis

A

A comparison of the security unit operation costs and all security measures compared to the amount of corporate property saved or recovered including any reduction of losses caused by injuries and lost productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cost benefit ratio

A

Helps determine efficiency or effectiveness versus cost. Three concepts: cost, reliability, delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Information Security

A

Protection of info and it’s critical elements, including the systems and hardware that use, store and transmit the info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Information Systems

A

Computer based info processing systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Internal Controls ( computers)

A

Procedures designed to control the operation of computer systems, controls over the configuration, changes to programs without approval and controlling administrative privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Defensible space

A

Includes territoriality and natural surveillance. Living environment must be opened up and used by residents. Stimulates self policing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Site design

A

Clustering of small numbers of residential units around private hallways, courtyards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Predictability

A

Percentage of chance that one can predict that upcoming events are likely to cause great security risks. Indicator of behaviour

27
Q

Probability

A

Reflects what is historically known. Likelihood of incident taking place based on past incidents

28
Q

Convenience

A

The more hard lined security is the less convenient it is for perp to take chance on committing crime

29
Q

Building inspection

A

Used to advise a tenant of their vulnerabilities as they pertain to physical characteristics of dwelling

30
Q

Security survey

A

Encompasses the entire complex in contrast to only a portion of the site
Documents used to id risk. Comprised do data collected by security personnel
ID facts, gaps or inefficiencies and overall security needs and provide recommendations to mitigate risk

31
Q

Security analysis

A

More in depth study, includes risk management , analysis of risk factors, environmental measures, analysis of crime patterns, fraud and internal theft

32
Q

Minimum security

A

Designed to impede some unauthorized external activity

33
Q

Low level security

A

Designed to impede and detect some unauthorized external activity

34
Q

Medium security

A

Designed to impede, detect and access most unauthorized external and some unauthorized internal activity

35
Q

High level security

A

Designed to impede, detect and assess most unauthorized external and internal activity

36
Q

Maximum security

A

Design to impede, detect, assess and neutralize all unauthorized external and internal activity

37
Q

Chain-linked fencing

A

Constructed of 7ft material excluding top guard
Must be of 9 gauge or heavier
4 sq. in. Or smaller openings
Twisted and barbed salvage at top and bottom
Secured to rigid metal or reinforced concrete posts set in concrete
Posts 10’ or less apart
Must reach within 2” of hard ground. Soft ground - reach deep enough to compensate for shifting soil or sand
All bolts and nuts holding hardware should be welded

38
Q

Ward lock

A

Longest in use and first developed

39
Q

Lever lock

A

Came after warded in 18th century. Offered more security than warded

40
Q

Pin Tumbler lock

A

Consists of : the pin, a driver or separate metal cylinder, and a spring

41
Q

Attack methods- drilling or punching

A

Breaking off combination dial and drilling a hole to the exposed locking device

42
Q

Attack methods- burning

A

Use of high temp torches to cut opening in wall or door

43
Q

Attack methods- pealing

A

Attack the seams of the vault, using tools to expose locking mechanism or interior

44
Q

Incandescent

A
Produces light by using electric current to heat a filament.
Instant on
Low initial cost
Compact
Short life
High heat outpu
Inefficient
45
Q

Quartz- Quartz halogen

A

Incandescent bulbs with halogen gas
Good color rendition
High heat output
Inefficient

46
Q

Fluorescent

A

Pass electricity through a gas enclosed tube to create light
Create 2Xs the light and half the heat of incandescent
Long life
Efficient
Temp sensitive

47
Q

Mercury Vapor

A
High intensity discharge device which produces light by excitation of mercury vapours.  Emits blueish white light.
Long life
Low initial cost
Delayed hot restart
Inefficient operation
48
Q

Metal halide

A
High intensity discharge arc tube which light is produced by the radiation of excited metal halides.
Excellent color rendition
Imitates daylight
Works well with CCTV
Restart can take several minutes
High initial cost
High maintenance cost
49
Q

High pressure sodium

A
High intensity discharge arc tube which light is produced by radiation from sodium Vapor operating under pressure
Very efficient 
Good in fog
Hot restart takes several minutes
High initial cost
50
Q

Low Pressure Sodium

A

High intensity discharge arc tube which light is produced from sodium Vapor operating under pressure
Very efficient
Poor color rendition
Expensive to maintain

51
Q

Barbed wire

A
7' height
Post not more than 6' apart
12 gauge twisted double strand
6" max between strands
Vertical wire midway between posts
52
Q

PPS consist of Three elements

A

Architectural, Operational, Security systems

53
Q

Architectural

A

Barriers, locks, exterior, interior lighting, critical building services, space layout, parking, adjacent buildings

54
Q

Operational

A

Organization and staffing, policies, procedures, training, visitot control, guard staffing, emergency response

55
Q

Security Systems element

A

Automated access control, intrusion detection systems, alarm systems, CCTV, comms,

56
Q

Three types of measure in PPS

A

Preventative, Corrective, Detective

57
Q

Preventative

A

Reduce likelihood of a deliberate attack, deter an attack, introduce delays, reduce vulnerabilities, deny the attack to be successful

58
Q

Corrective

A

Reduce the effects of an attack and restore the facility to normal ops

59
Q

Detective

A

Distinguish between authorized and unauthorized personnel, help discover attacks, and trigger appropriate preventative or corrective measures

60
Q

Probability

A

The study of possibility of occurrence

61
Q

ALE annual Loss Expectancy

A

Calculation of impact and frequency
ALE= 10(f+i-3)/ 3
I= cost valuation (impact) of the event= single loss expectancy (sle)
f= estimated frequency of the event = annual rate of occurrence (ARO)

62
Q

Criticality during a cost analysis

A

Prevention- I’d threat before it can get started
Control- I’d how threat event might be kept from impacting specific assets
Recovery- how the operation will be restored after the threat

63
Q

Cost-Benefit ratio

A
Determines the efficiency or effectiveness versus cost
3 concepts that make up ratio:
Cost
Reliability
Delay
64
Q

VSAT- vulnerability Self Assessment Tool

A

Tool to help develop PPSs. Protects specific targets from specific threats

ID assets
ID thReats
Determine criticality
ID existing countermeasures
Determine risk level
Determine probability of failure
Assign vulnerability
Determine if risk is acceptable
Develop new countermeasures
Perform risk-cost analysis
Develop BCP
65
Q

CARVER

A

Vulnerabilities from attacker POV
Criticality - how important the target is
Accessibility- ease do access to the target
Recoverability-ability to recover from an attack
Vulnerability-ease of attack on target successfully
Effects-direct loss from attack
Recognizability- ease of target recognition