TDMM Chapter 17 Flashcards
Asset
An employee, contractor or any possession
DACS
Digital Alarm Communicator System
DARR
Digital Alarm Radio Receiver
DART
Digital Alarm Radio Transmitter
EAC
Electronic Access Control
ESS
Electronic Safety and Security
FACP
Fire Alarm Control Panel
FDAS
Fire Detection and Alarm System
Fixed Camera
A camera dedicated to a single view that does not change unless physically moved
Layering
The use of many layers of barriers to provide the maximum level of deterrence and delay
NAC
Notification Appliance Circuit
Pan and Tilt
A camera that allows 180 or 360 degree view, controlled remotely
Risk
Potential for loss from an event
Threat
An intent to do harm
Video Surveillance
The extension of human vision to areas requiring surveillance
Name six primary functions that an ESS system performs
- Access control
- Surveillance
- Intrusion Detection
- Fire Alarm
- Mass notification
- Area of rescue communications
Name three independent components of a security system
- Electronic
- Architectural
- Operational
Lighting is categorized as what type of countermeasure?
Architectural
Access control is categorized as what type of countermeasure?
Electronic
Contingency planning is categorized as what type of countermeasure?
Operational
What is a fundamental concept of security design?
The use of layerinf
Describe the theory of concentric circles
Using multiple points of detection provides the greatest opportunity for evaluation and reaponae
What principle serves as the basis of event based monitoring?
The principle that electronic systems can efficiently and effectively drive operational response
What is required to provide a person with total safety and security?
Total isolation from their environment and other people while maintaining basic life support
What is required to provide objects with total safety and security?
Isolating the object from access
Name the three steps performed by a security consultant
- Assess known and potential risks
- Estimate the likelihood that threats will occur
- Recommend countermeasures
What is the key to mitigating risks?
Identifying the source of a potential risk
Name four factors that affect a users access level
- Security clearance
- Job title
- Rank
- Employee type
Name two primary components of an EAC
- A computer with EAC software
- One or more peripheral devices or control panels
Define the three levels of EAC systems
- Level 1 - Headend processing software
Level 2 - Intelligent field processing
Level 3 - Field devices
What is a credential?
An item that allows entry into an area
What type of cables make up an EAC cable?
Four individually shielded pairs
Name four types of cabling used for communications in an EAC system
- Fiber
- Twisted pair
- Wireless
- Cellular
Name four types of basic door locks
- Bored locks
- Rim locks
- Mortise locks
- Vertical rods
Name four types of basic lock functions
- Entrance
- Store room
- Classroom
- Vestibule
How does an entrance lock function?
When it is pushed in, an inside button locks the outside lever
How does a storeroom lock function?
The lock is key operated from the outside because the outside lever is always locked. The inside lever allows free egress
What determines if the outside lever of a vestibule lock is locked or unlocked?
The outside lever is accessed by a key when the door is locked. A key in the inside lever determines if the outside lever is locked or unlocked
What is the most common type of door hardware?
Electric strikes
Name three performance ratings used to describe electric strikes
- Static strength
- Dynamic strength
- Endurance levels
Name three types of optional monitoring switches for an electric strike
- Latch bolt monitor
- Locking cam monitor
- Dead bolt monitor
How long does it typically take for an electric strike to unlock?
8 to 11 seconds
Name two types of magnetic locks
- Direct hold
- Shear locks