Summary CPP cards Flashcards
What are the main purposes of testing physical security systems and technologies?
To ensure continuous monitoring for performance, effectiveness, and suitability.
What does the ASIS International Risk Assessment standard define security as?
The protection being provided against hazards, threats, risks, and menaces.
How can managers benefit from a Security Metrics Program?
They can v, a, c and m PC and SP
They can view, analyze, compare, and measure program components and staff performance.
What 5 pieces of knowledge can security professionals gain from effectively applying security metrics?
UP
I R
D P
A C and
Lev Se Ca
Understanding performance
Identifying risks
Discovering problems
Assessing compliance
Leveraging security capabilities
What are the key aspects included in designing a metrics program for security?
MF
T____, o____ and s_____ C E
Measurement framework,
technical, operational, and
strategic criteria evaluation.
What are the three key approaches to evaluating security metrics?
Effectiveness, efficiency, and strategic improvement aligned with organizational objectives.
What 6 questions should be considered when evaluating each element of the security program?
PF
SF
NP
P
T and
R
• PF → Primary functions
• SF → Secondary functions
• NP → Necessary procedures
• P → Processes
• T → Tools
• R → Resources
What is the basic tool for developing an understanding in physical security projects?
Security risk assessment or security survey.
What is the first step in a comprehensive risk assessment?
Identifying and valuing the organization’s assets.
What are the 6 categories that can increase assets’ exposure to the risk of loss?
P,S,P environment
HE
P and P and
CC
Physical environment,
social environment,
political environment,
historical experience,
procedures and processes, and
criminal capabilities.
What is a gap analysis used for in the risk assessment process?
To determine steps to i_____
An org’s r______ a______ capacity.
To determine steps to improve an organization’s risk assessment capacity.
What is the best method for monitoring and preparing to respond to security risks?
An ongoing risk assessment program.
What is the difference between qualitative and quantitative risk assessment?
Qualitative uses expert judgment, while quantitative uses probabilities and statistics.
When might using a blended approach for risk assessment be appropriate?
When combining elements of qualitative and quantitative analysis is most suitable.
What is the focus of a physical security assessment or security survey?
Risks to physical assets and property, along with protection measures.
What eight documents are typically included in a bid package?
C I
Dr
Sp
HS
BI
Li
T and C, and
S-s Info req
Contract information,
drawings,
specifications,
hardware schedules,
bidder instructions,
licenses,
terms and conditions, and
security-sensitive information requirements.
When should a bidder’s conference or site visit be scheduled?
One week after the Request for Proposal (RFP) is issued.
What are the three steps taken after receiving bids for a project?
EB for C to R
P a FE and
S a B
- Evaluate bids for conformance to requirements
- Perform a financial evaluation, and
- then select a bidder.
What are 3 pillars discussed during the initial kick-off meeting for a contract?
Setting the course for scope, schedule, and budget.
What activities are involved in managing the warranty period?
Initiating and evaluating warranty work conformance within the scope and schedule.
What is the focus of the initial phase of a security design project?
P&A to develop the B of D and resultant D D
Planning and assessment to develop the basis of design and resultant design documentation.
Why is it important to establish a security ‘basis of design’?
PR
Th
As
Vu
RA and
CDS
• PR → Project Requirements
• Th → Threats
• As → Assets
• Vu → Vulnerabilities
• R A → Risk Assessment
• CDS → Conceptual Design Solutions
What are 12 key elements considered in developing design criteria?
Co and St
Ca, Qu, and Pe,
Co, fe and op,
Cu, im, and mo, and
Re
Codes and standards,
Capacity, quality and performance,
Cost, features and operations,
culture, image, and monitoring, and
response.
What are the six elements of the management process in security projects?
IM
QM
RM
CM
RM and
PM
• IM – Integration Management
• QM – Quality Management
• RM – Resource Management
• CM – Communications Management
• RM – Risk Management
• PM – Procurement Management
What are the three constraints under which security projects work?
Project scope, project schedule, and project budget.
What are the 5 basic tasks of physical protection system (PPS) implementation?
P&A
DCS
PDD
SB and
In
• P&A → Planning and assessment
• DCS → Developing conceptual solutions
• PDD → Preparing design documentation
• SB → Soliciting bids
• In → Installation
What are the 6 roles a security project manager may play in the security project process?
DCC
PDM
BM
PI
S and
C
Design concept creator,
principal decision maker,
budget manager,
project influencer,
stakeholder, and
contractor.
What are the five phases through which security projects are typically administered?
PC
PP
PDM
PBPM and
PC
Project conception,
project planning,
project design management,
project bid process management, and
project construction.
What should security projects do to integrate physical, electronic, and operational security elements?
Use AR
To Create a CS
To d, d and R
To S I
Use available resources
to create a cohesive solution
to deter, delay, and respond
to security incidents.
What 6 things are included in the project management process for an integrated PPS project?
U D M
D P S, S and B
D the P, and
M the B P
Understanding decision makers,
defining project scope, schedule and budget
designing the project, and
managing the bid process.
What are the two crime prevention operating assumptions related to CPTED?
C P K is C D and In; and
S must be F and C
1) Crime prevention knowledge is continually developing and interdisciplinary; and
2) strategies must be flexible and creative.
What are 5 ways CPTED measures can help prevent repeat victimization?
By R S of V
R A
I P S
P V T and
B easy A to T
By quickly removing signs of victimization,
By regulating access
By improving physical security
By protecting vulnerable targets, and
By blocking easy access to targets
According to routine activity theory, how can the presence of capable guardians deter crime?
Capable guardians may deter crime by their presence.
What is the focus of situational crime prevention?
To manage, design, or manipulate the environment to increase effort and risk for potential offenders while reducing rewards.
What are the four main strategies of second-generation CPTED?
Cohesion, capacity threshold, community culture, and connectivity.
What does CPTED 3-D stand for?
Designation of space,
Definition in terms of management and identity, and
Design as it relates to desired function and behavior.
What 3 tools apply to the underlying elements of CPTED: territoriality, surveillance, and access control?
E T
S ( n______/e_____ ), and
A C (n_____/m______)
Effective training,
surveillance (natural/ electronic), and
access control (natural/mechanical).
How can security practitioners reduce opportunities for crime through architectural design?
By integrating CPTED features during initial planning and working with appropriate community and professional groups.
What is the focus of access control strategies (3) in physical security?
1) deny access to a crime target,
2) create a perception of risk in potential offenders,
3) and include detection, delay, and response strategies.
Name some examples (3) of mechanical access control methods.
L,
C K S and
S D and WH
Locks,
card key systems,
special door and window hardware.
Why should a metrics program only be established after introspection and planning?
To ensure measures are properly collected, analyzed, defined, scoped, and applied.
What does SMART stand for in the context of metrics?
Specific, Measurable, Attainable, Repeatable, Time-dependent.
Why should metrics be specific according to the course notes?
To provide actionable intelligence for a clear purpose.
What does it mean for a metric to be attainable?
A metric should not take excessive time to gather to remain effective.
Why is it important for a metric to be time-dependent?
Consistent collection ensures accuracy and meaningful comparison.
How does analyzing physical security systems from an operational perspective help?
It enhances efficiency by addressing system flaws like excessive alarms.
What insights (3) do metrics tracking the human element in security programs provide?
In into RS
C, and
OE
Insights into required staffing,
costs, and
operational efficiency.
How does collecting and analyzing metrics help improve a security program?
It shows program effectiveness and areas for enhancement.
What should acceptance tests of physical security measures simulate?
Actual threat conditions up to site-specific threat limits.
What 3 factors should be considered in determining what tests to conduct on security systems?
S-S T
W-C S
C S F
Site-specific threats,
worst-case scenarios,
critical system functions, etc.
What are the 6 categories of expenses in security system procurement?
Bonding,
overhead,
operating costs,
maintenance costs,
other costs, and
adjustments.
What are the three major forms of security systems procurement?
Sole source, request for proposal (RFP), and invitation for bid (IFB).
When should the type of procurement be selected in the design phase?
Before or at the start of the design phase.
When is sole source procurement appropriate?
When an owner already has a vendor on board.
What is the purpose of a Request for Proposal (RFP) in security systems procurement?
To competitively choose vendors based on factors like cost, schedule, and technical ability.
What is the key feature of Invitation for Bid (IFB) in procurement?
Projects are competitively bid, and the award goes to the lowest responsive bidder.
What should be reviewed when comparing proposal costs?
The L-C C, which includes c____ and m_____ costs
Over the system’s u_____ life.
The life-cycle cost, which includes capital and maintenance costs over the system’s useful life.
What factors should be checked if one proposal’s costs are significantly lower than others?
ME
Q of E
CE
Understanding of the P and
FS
Mathematical errors,
quality of equipment,
contractor experience, understanding of the project, and financial stability.
What should be done before making an award decision in procurement?
Check all contractors’ references.
What should the designer attempt to determine during interviews with leading contenders?
Good relationship with contractor’s reps, experience, problem-solving, and working well with other trades.
What should negotiating the final price with shortlisted contractors be based on?
Value.
What is essential for the successful implementation of any physical security construction project?
A well-defined and executed procurement contract.
What are the 6 components of a full-featured access control system?
CR
CC
DP
CD
S and
R to E devices
Credential reader,
communication cabling,
distributed processor,
central database,
software, and
request-to-exit devices.
What is personnel access control used for?
To authorize entry and verify personnel authorization to a controlled area.
How can an access control point be defeated through deceit?
By employing false pretenses to convince security personnel for entry.
What are some common types of credentials used in personnel access control?
Photo identification badges, exchange badges, stored-image badges, coded credentials.
What is the purpose of metal detectors in contraband detection?
To sense contraband using a varying magnetic field over a short period.
What are the basic building blocks of an intrusion detection system?
Sensors that initiate the detection function and indicate intrusion attempts.
What 4 technologies can sensors in intrusion detection systems be based on?
Op
El
ElMe
Me
• Op → Optical
• El → Electronic
• ElMe → Electromechanical
• Me → Mechanical
What 4 things must be included in a VA report to make it understandable to facility management?
D of F
DT
IA and
SEA
Description of facility,
defined threats,
identified assets, and
system effectiveness analysis.
How should a VA report be protected and distributed?
Defined in master project agreement for protection and appropriate distribution.
What approach does the assessment team take in the Outside-Inward Approach?
Adversary role, penetration of physical perimeter, envision ways to get in.
In the Inside-Outward Approach, which role does the assessment team take?
Security professional (defender) role, working from asset/target outwards.
What are 5 examples of security layers considered in VA assessments?
A/T
C/V
C A
S D and
B P
Asset/target,
container/vault,
controlled area,
security desk, and
building perimeter.
What does the Functional (Security Discipline) Approach address in VA assessments?
Addresses each security function or discipline individually.
What does the Security Architecture and Engineering component of VA assessments address?
Design of facilities with security features built in from the start.
What 4 things are included in Structural Security Measures in VA assessments?
O B S
P B
L S and
Li S
Overall building structure,
physical barriers, and
locking and lighting systems.
What does Crime Prevention Through Environmental Design (CPTED) focus on in VA assessments?
Engages planners, designers, architects, law enforcement, for crime prevention.
What 5 things does the Electronic Security Systems component of VA assessments encompass?
AC
ID
S
Co
ES
• A C→ Access control
• I D → Intrusion detection
• S → Surveillance
• C → Communications
• ES → Electronic systems
Why is evaluation of security officers and the human element important in VA assessments?
Discuss importance of QA and QC programs in managing security officers.
What are the three primary functions of a Physical Protection System (PPS)?
D
D and
R
Detection, delay, and response.
What does the detection function in a PPS involve?
Discovery of C or O actions by an a______ and e______ C
Discovery of covert or overt actions by an adversary and entry control.
How is delay effectiveness in a PPS measured?
Time required by the adversary to bypass each delay element.
What is the purpose of the response function in a PPS?
Preventing adversary success through interruption and accurate communication.
Why is it important for a PPS to have functional integration of detection, delay, and response?
To reduce v____; deviation from this integration implies h_____ v_______
To reduce vulnerability; deviation from this integration implies higher vulnerability.
What factors determine the amount of protection required for an asset?
V of the A and the
R T of the En
Value of the asset and the risk tolerance of the enterprise.
Why is a cost-benefit analysis important in the security assessment process?
To weigh actual costs of security measures against projected results.
In a Vulnerability Assessment (VA), why is it crucial to analyze the PPS as a system of features working together?
To determine the overall effectiveness and identify potential solutions.
What is the purpose of a VA report in relation to the PPS?
Inform facility management of PPS state and needed upgrades.
What are the three types of skills demanded in security roles?
Cognitive (knowledge),
psychomotor (physical), and
affective (attitudinal) skills.
What should be part of a risk analysis survey when determining the size of security force?
Determining the size of the force.
What are the three security force models discussed in the notes?
Proprietary or in-house staff, contract staff, and a hybrid approach.
What 8 factors should organizations consider when determining the appropriate security force structure?
T of O and PG
L and R R
F and M C
PE and CF
Type of organization and programmatic goals,
location(s) and regulatory requirements,
financial and management capabilities,
performance expectations and cultural factors.
What are the 6 basic functions of a security officer force?
Pa
A C
In
Mo
ER and
Tr Co
Patrol,
access control,
inspection,
monitoring,
emergency response,
traffic control, etc.
What 5 vital roles can security officers fill in organizations?
PS and CP
Co and Ma tasks and
Re
Physical security and crime prevention
Consulting and management tasks, and
Representative.
What should organizations review before purchasing uniforms and equipment for security officers?
Relevant laws and guidelines to ensure compliance and differentiate from law enforcement officers.
Why is it important to establish minimum standards for hiring and training security officers?
Quality and competence of security force impact the success of security operations.
How can organizations leverage the human element in security?
By including nonsecurity personnel with specialized security knowledge.
What should organizations do to assess the effectiveness of physical security measures?
Test and monitor security measures.
What are the three main types of tests mentioned in the notes?
C…..
LS….. and
Ev
Coordinated, limited scope, and evaluation tests.
How often should an evaluation test of the security system be performed?
At least once a year.
What should a formal report after an exercise document?
The review of PAPMS plans, processes, proposed actions, and nonconformities.
What is the purpose of conducting internal audits?
To evaluate the physical protection system and validate compliance.
What are the two main types of physical protection system maintenance?
Remedial maintenance and preventive maintenance.
What does preventive maintenance include?
Keeping hardware and software in good condition, updating, and testing.
What are the three major security purposes of lighting?
Creating a psychological deterrent, enabling detection, and enhancing video surveillance.
What are the characteristics that affect security effectiveness of lighting?
Q of L
L or I,
L R, and
C T
Quantity of light, level or intensity, light reflectance, and color temperature.
What are the four applications for security lighting?
Standby, continuous, movable, and emergency.
What are the types of lighting equipment used for security purposes?
St, Se, Fl, Fr and H M lighting.
Streetlight, searchlight, floodlight, Fresnel, and high mast lighting.
What does Crime Prevention Through Environmental Design (CPTED) target?
Places, behavior, design and use of space.
What are the underlying elements of CPTED?
Territoriality, surveillance, and access control.
What are the categories of CPTED measures?
Mechanical, organizational, and natural.
What is natural territorial reinforcement in CPTED?
Establishing ownership and accountability to increase vigilance.
How can natural surveillance help in CPTED?
Increasing v______ to detect T or M
Increasing visibility to detect trespassers or misconduct.
What is natural access control in CPTED?
Using _____ to d____ and l______ access to a space.
Using barriers to define and limit access to a space.
What are the three main characteristics of intrusion sensor performance?
Probability of detection (PD), nuisance alarm rate, vulnerability to defeat.
Name some authoritative bodies providing guidance on sensor standards.
U L
ASTM
GSA
NFPA and
EAS
Underwriters Laboratories (UL), American Society for Testing and Materials (ASTM), General Services Administration (GSA), National Fire Protection Association (NFPA), European Alarm Standard.
What are the classifications of exterior intrusion sensors based on detection methods?
P or A
C or V
L of S or T F
V or line detection
App
Passive or active, covert or visible, line-of-sight (LOS) or terrain-following, volumetric or line detection, application.
Which are 7 common exterior sensor technologies mentioned in the notes?
PCC
FDS
SF
EF or CS
FIS
Bi M S
VMD
• PCC → Ported coaxial cables
• FDS → Fence disturbance sensors
• SF → Sensor fences
• EF or CS → Electric field or capacitance sensors
• FIS → Freestanding infrared sensors
• Bi M S → Bistatic microwave sensors
• VMD → Video motion detectors (VMDs)
What is emphasized as important despite technological advancements in security solutions?
The need for well-trained security officers.
Why is there a growing trend towards more highly trained security officers?
To offer a greater return on investment.
What are the challenges presented by the rapid change of technologies in security?
Increased need for security officers with learning and adapting capabilities.
How should businesses approach the training of security personnel?
By committing resources to support the required training for better service quality.
According to the notes, how should security personnel be viewed in a security plan?
As part of a comprehensive plan, not a standalone resource.
What is the most critical yet most expensive component of a security program?
Security personnel.
What categories of services are typically included in a system maintenance agreement?
Both physical protection system (PPS) and remedial maintenance.
Why is it beneficial to select a single contractor for system maintenance?
To have a single point of contact for diagnosing and resolving problems.
What should a maintenance agreement be structured to resolve?
Both noncritical problems and major disruptions to the organization.
Why is it important to train staff in preventive maintenance?
To better understand and operate security systems.
What should the maintenance plan consider regarding security systems tuning?
Periodic tuning to eliminate nuisance and false alarms.
What is essential to develop in a maintenance plan?
G to identify R and R
Guidelines to identify roles and responsibilities.
What aspects of service levels should be jointly developed by the customer and contractor?
SP
SL and
RT for each component.
Support plan, service levels, and response times for each component.
How can costs escalate rapidly in a maintenance agreement?
Due to staff hours, travel, and equipment required for guaranteed response times.
Why should roles and responsibilities be clearly defined in system maintenance agreements?
To ensure minimum downtime and operational efficiency.
What factors may affect support fees in maintenance agreements?
Geographic location, online diagnosis, and support capabilities.
What pricing approach might consist of a fixed fee for an advance period?
Plus allowances or formulas for various costs.
What type of documentation should the manufacturer provide regarding the system configuration?
Comprehensive documentation including
SS, CD, SPL and IS
Comprehensive documentation including switch settings, cable diagrams, spare parts lists, and installation steps.
Why is it important for all subsystems to have advanced diagnostics?
To identify faulty components for easy replacement in the field.
How can remote diagnostics be helpful for a large, decentralized system?
It allows for troubleshooting and diagnostics without physical presence.
What does subscribing to an upgrade service after installation guarantee?
Incorporation of latest engineering change orders and field change orders, extending the system’s life.
Why is it important to keep accurate records about security systems?
To help identify trouble spots, deficiencies, and justify system replacements.
What should maintenance records include for all components?
Components should be cross-referenced to subsystems to identify repair patterns.
Why should spare parts and repair equipment be procured in advance?
To minimize downtime in the event of remedial repairs.
Why is it recommended to standardize devices through sole-source vendor relationships?
To reduce inventory needs and training requirements.
What should maintenance manuals provided by the contractor include?
• I → Inspection
• Perform → Preventive maintenance
• Fixes → Fault diagnosis
• Regularly → Repair/Replacement procedures
This phrase reinforces the idea of consistently maintaining and fixing equipment.
What should be considered for preventive maintenance tasks to be performed adequately?
Ch______ that include m_______ guidelines.
Checklists that incorporate equipment manufacturers’ guidelines.
Why is it important to develop checklists for preventive maintenance tasks?
To ensure all necessary tasks are performed adequately and consistently.
Why should preventive maintenance be pursued simultaneously with remedial maintenance activities?
To conserve travel time and optimize maintenance efficiency.
What types of adjustments may have to be made periodically to security systems?
Adjustments to ensure effective operation like detection pattern modifications for sensors.
What should a regular test and maintenance program include for effective device operation?
Periodic equipment and circuit testing, backup power checks, and thorough equipment inspections.
What should be verified for the data and video transmission system during security system acceptance tests?
Installation, testing, and approval as specified.
What verification is required for remote devices during security system acceptance tests?
Functionality, communication with the monitoring center, and specified functions.
What needs to be verified about the video switcher during security system acceptance tests?
FF and PS
Full functionality and proper software programming.
What is essential to verify for all system software functions during security system acceptance tests?
Correct operation.
What must be verified regarding electrical and mechanical controls during security system acceptance tests?
Designed functions are performed.
How should cameras aimed at the rising or setting sun be positioned during security system acceptance tests?
Aim sufficiently below the horizon to avoid viewing the sun.
What verification is needed for night assessment capabilities near assessment areas in security system acceptance tests?
Verification of capabilities, including headlight effects.
What must be verified to avoid picture rolling when cameras are switched during security system acceptance tests?
S______ of cameras
Synchronization of cameras.
What should be checked for the alarm interface to the intrusion detection subsystem during security system acceptance tests?
F and ACC for AP
Functionality and automatic camera call-up for alarm points.
What is the purpose of post-implementation testing for security systems?
To ensure proper system operation and conformance to specifications.
What is the purpose of physical security?
To protect assets, whether tangible or intangible.
What are the four basic functions of physical security strategy?
CA
Ob
D e
Ev (option but helps with R D-m)
Re
• Controlling access
• Observing
• Detecting events
• Evaluating (optional, but helps with response decision-making)
• Responding
Define the concept of the four Ds in physical security.
Deter, detect, delay, and deny an adversary access.
What are the components of physical security measures?
St
El and
Hu Co
Structural, electronic, and human components.
List examples of structural components in physical security.
L
L and L
CPTED,
B and F
Lighting,
locks and landscaping
CPTED,
barriers and fencing
Name some examples of electronic components in physical security.
Su
AC
I D S
Surveillance, access control, intrusion detection systems.
What are some examples of human components in physical security measures?
SO F
Vi Ma and
In Ma Sy
Security officer force, visitor management, incident management systems.
Explain the importance of coordinating physical security components with the security functions.
To ensure a well-orchestrated integrated protection strategy.
Why is it crucial to address the relationship between security components and peripheral systems?
To prevent conflicts and ensure proper functioning.
What are some examples of peripheral systems in physical security planning?
Life safety systems,
building controls, and
IT infrastructure.
What is the purpose of a security survey?
To assess current security level, identify deficiencies, and recommend improvements.
Define adequacy in security measures.
Adequacy refers to meeting the appropriate level of security or protection.
What is a vulnerability in security terminology?
A weakness that can be exploited by an adversary.
How does a vulnerability assessment differ from a comprehensive risk assessment?
A vulnerability assessment focuses more on vulnerabilities, while a risk assessment covers assets, threats, and consequences.
What are some objectives of a vulnerability assessment?
Id W,
L of R
S pts of F and
In Re Ca
Identify weaknesses, lack of redundancy, single points of failure, and inadequate response capability.
What components are evaluated in a Physical Protection Systems (PPS) analysis?
PPS components at both component and system levels are evaluated.
What are some elements of a PPS analysis?
Elements include gathering information, reviewing documents, interviews, and evaluation testing.
What is the goal of a vulnerability assessment?
To identify weaknesses in PPS components related to security functions.
What is SWOT analysis?
A tool that assesses strengths, weaknesses, opportunities, and threats.
What are the five criteria of good reporting?
Accuracy, clarity, conciseness, timeliness, and slant or pitch.
Why should a survey report include positive and negative findings?
To focus on how security can be improved and why it’s important.
What are considerations that may affect the effectiveness of automated assessment tools?
Qualifications of assessment personnel, cost, complexity, and inability to assess intangible factors.
Why should automated assessment tools not be relied upon as the sole process in a physical security assessment?
They may not account for all factors accurately and should be supplemented.
What does project management involve in the context of physical security?
Planning, organizing, monitoring, and controlling resources for security projects.
What distinguishes a project from ordinary operations?
Projects are temporary efforts with defined goals and objectives.
What are the goals of security projects?
Improve security management and assure operational effectiveness.
What areas should a security project ensure effectiveness in?
Only authorized access and secure management of public areas.
What should records of system tests include?
Test date, name of person conducting the test, and results.
What factors should a security manager consider for system replacement?
Cost of maintenance, lack of spare parts, obsoleteness of hardware/software, operating costs, reliability, new technologies, and features.
Where can additional information for Domain Five be found according to the text?
Protection of Assets - Physical Asset Protection Standard 243.
What 7 things should the factory test setup include during physical security predelivery testing?
All SCC M E
Se
Co Ce
Da Tr Li
Lo Pro
Sen Sim
Se
Po Con
• All SCC M E → All security control center monitoring equipment
• Se → Sensors
• Co Ce → Control center (security control center monitoring equipment)
• Da Tr Li → Data transmission links
• Lo Pro → Local processors
• Sen Sim → Sensor simulators
• Se → Sensors
• Po Con → Portal configurations
What 8 pieces of equipment are needed for testing security video systems during physical security predelivery testing?
VC with L
Mo
VR
VS
AIP
P/T M
Ca
An Eq
• VC with L → Video cameras with lenses
• Mo → Monitors
• VR → Video recorder
• VS → Video switcher
• AIP → Alarm input panel
• P/T M → Pan/tilt mount
• Ca → Cabling
• An Eq → Ancillary equipment
What should a customer require in a written report of factory testing during physical security predelivery testing?
A report indicating
A T P,
R and
Re of D noted
A report indicating all tests performed, results, and resolution of deficiencies noted.
What 5 things should the contractor provide to the customer before site acceptance testing begins?
A report describing
FT
D
C
C and
A S T P
A report describing
functional tests,
diagnostics,
calibrations,
certification, and
approved site test procedures.
What 3 things should the contractor demonstrate during site acceptance testing?
Co with CR
Phy and Fu P R and
C of N and F A rates
Compliance with contract requirements,
physical and functional project requirements, and
calculation of nuisance and false alarm rates.
When should the site acceptance test begin?
After receiving written approval from the customer.
What actions can the customer take during site acceptance testing if the system fails to perform as specified?
The customer may terminate testing at any time.
What should be considered when selecting countermeasures?
Effectiveness ………depending on adversary, different threat levels, increasing sophistication.
What are the components of structural security?
Elements like walls, doors, windows, roofs, floors, fencing, and barriers.
What types of safes are there in terms of protection?
Record safes for fire protection, safes for valuables protection.
What are the two general classes of locks?
Mechanical locks and electrified locking mechanisms.
What are the benefits of traditional mechanical locks and keys?
Low cost,
simplicity, and
reliability….despite modern access control systems.
What 6 elements are considered in professionally planned locking systems?
LS Pl
LP
R-e Sys,
C-o locks
Co and bi locks
Lock system planning,
locking policy,
rapid-entry systems, credential-operated locks, combination and
biometric locks.
What disciplines are involved in the study of lighting for security applications?
LD
En, and
Te
Various disciplines like lighting design, engineering, and technology.