Terms and Definitions Flashcards
Access Control
Control of persons, vehicles and materials through the implementation of security measures for a protected area.
Alarm System
Combination of sensors, controls and annunciators arranged to detect and report an intrusion or other emergency
Asset
Any tangible or intangible value (people, property, information) to the organization
barrier
A natural or man-made obstacle to the movement/direction of persons, animals, vehicles, or materials.
building envelope
2.1 The separation between the interior and the exterior environments of a building. It serves as the outer shell to protect the indoor environment as well as to facilitate its climate control. Building envelope design is a specialized area of architectural and engineering practice that draws from all areas of building science and indoor climate control.
camera
2.1 Device for capturing visual images, whether still or moving; in security, part of a video surveillance.
CCT rating
2.1 Corrected Color Temperature (CCT) is a measure of the warmth or coolness of a light. It is measured in degrees Kelvin which is the Centigrade (Celsius) absolute temperature scale where 0°K is approximately 272°C.
CCTV
closed-circuit television or video surveillance
contract security service
2.1 A business that provides security services, typically the services of security officers, to another entity for compensation.
CPTED
crime prevention through environmental design. 2.1 An approach• to reducing crime or security incidents through the strategic design of the built environment, typically employing organizational, mechanical, and natural methods to control access, enhance natural surveillance and territoriality, and support legitimate activity.
crime
2.1 all punishable acts, whatever the nature of the penalty. An act or omission which is in violation of a law forbidding or commanding it, for which the possible penalties
denial
Frustration of an adversary’s attempt to engage in behavior that would constitute a security incident
detection
2.1 The act of discovering an attempt (successful or unsuccessful) to breach a secured perimeter (such as scaling a fence, opening a locked window, or entering an area without authorization).
event
2.1 A noteworthy happening; typically, a security incident (see security incident), alarm, medical emergency, or similar occurrence.
facility
One or more buildings or structures that are related by function and location, and form an operating entity
lighting
2.1 Degree of illumination; also, equipment, used indoors and outdoors, for increasing illumination (usually measured in lux or foot-candle units).
intrusion detection system
2.1 A system that uses a sensor(s) to detect an impending or actual security breach and to initiate an alarm or notification of the event.
lock
2.1 A piece of equipment used to prevent undesired opening, typically of an aperture (gate, window, building door, vault door, etc.), while still allowing opening by authorized users.
perimeter protection
Safeguarding of a boundary or limit.
physical security
That part of security concerned with physical measures designed to safeguard people; ,to prevent unauthorized access to equipment, facilities, material, and documents; and to safeguard them against a security incident
physical security measure
A device, system, or practice of a tangible nature designed to protect people and prevent damage to, loss of, or unauthorized access to assets
policy
2.1 A general statement of a principle according to which an organization performs business functions.
private security
The nongovernmental, private-sector practice of protecting people, property, and information; conducting investigations; and otherwise safeguarding an organization’s assets
proprietary security
Security performed for an organization by an internal department
contract security
Security performed by an external, hired firm
private security officer
An individual, in uniform or plain clothes, employed by an organization to protect assets (see assets). Also known as a “guard”
procedure
Detailed implementation instructions for carrying out security policies; often presented as forms or as lists of steps to be taken prior to or during a security incident
progressive collapse
2.1 Occurs when the failure of a primary structural element results in the failure of adjoining structural elements, which in turn causes further structural failure. The resulting damage progresses to other parts of the structure, resulting in a partial or total collapse of the building.
proprietary information
2.1 Valuable information, owned by a company or entrusted to it, which has not been disclosed publicly; specifically, information that is not readily accessible to others, that was created or collected by the owner at considerable cost, and that the owner seeks to keep confidential.
proprietary security organization
2.1 a department within a company that provides security services for that company.
protection-in-depth
The strategy of forming layers of protection for an asset
risk
The likelihood of loss resulting from a threat, security incident, or event
risk assessment
2.1 The process of assessing security-related risks from internal and external threats to an entity, its assets, or personnel.
risk management
2.1 A business discipline consisting of three major functions: loss prevention, loss control, and loss indemnification.
security incident
2.1 An occurrence or action likely to impact assets.
security manager
2.1 An employee or contractor with management-level responsibility for the security program of an organization or facility.
security measure
2.1 A practice or device designed to protect people and prevent damage to, loss of, or unauthorized access to equipment, facilities, material, and information.
security officer
An individual, in uniform or plain clothes, employed to protect assets
security survey
A thorough physical examination of a facility and its systems and procedures, conducted to assess the current level of security, locate deficiencies, and gauge the degree of protection needed
security vulnerability
An exploitable security weakness
site hardening
2.1 Implementation of enhancement measures to make a site more difficult to penetrate.
stand-off distance/set-back
The distance between the asset and the threat, typically regarding an explosive threat
surveillance
2.1 Observation of a location, activity, or person.
tailgating (piggybacking)
To follow closely. In access control, the attempt by more than one individual to enter a controlled area by immediately following an individual with proper access.
threat:
2.1 An action or event that could result in a loss; an indication that such an action or event might take place.
throughput
2.1 The average rate of flow of people or vehicles through an access point.
token
2.1 An electronically encoded device (i.e., a card, key-fob, etc.) that contains information capable of being read by electronic devices placed within or at the entry and exit points of a protected facility.
uninterruptible power supply (UPS):
2.1 A system that provides continuous power to an alternating current (AC) line within prescribed tolerances; protects against over-voltage conditions, loss of primary power, and intermittent brownouts. Usually utilized in conjunction with an emergency generator.
video surveillance
2.1 A surveillance system in which a signal is transmitted to monitors/recording, and control equipment. Includes closed-circuit television (CCTV) and network based video systems.
Defensible Space
property divided into smaller, clearly defined areas/zones
Alternate Worksite
a work location, other than the primary location, to be used when the primary location is not accessible
Business Continuity
A comprehensive managed effort to prioritize key business processes, identify significant threats to normal operation and plan mitigation strategies to ensure effective and efficient organizational response to the challenges that surface during and after a crisis
Business Continuity Plan - BCP
An ongoing process supported by senior management and funded to wnsure that the necessary steps are taken to identify the impact of potential losses, maintain viable recovery strategies and plans, and ensure the continuity of operations through personnel training, plan testing and maintenance
Business Impact Analysis (BIA)
A Management level financial analysis that identifies the impacts of losing an organization’s resources. The analysisi measures the effect of resource loss and escalating lossess over time in order to provide reliable data upon whish to base decisions on mititgation, recovery, and business continuity strategies.
Contact List
A list of team membvers and key players in a crisis. Includes home phone numbers, cell phone numbers
Crisis
any global, regional or local natural or human-caused event or business interruption that runs the risk of
* escalating in intensity
*adversely impacting shareholder value or org’s financial position
*causing harm to people or damage to property of the environment
*falling under close media/ gov’t scrutiny
*
Startup time ( strike time)
Time it takes a light source to come to full illumination
Alternate Worksite
A work location other than the primary location to be used when the primary is not accessible
Business Continuity
A comprehensive managed effort to prioritize key business processes, identify threats to normal operations, and plan mitigation strategies to ensure effective and efficient response to challenges that surface during and after crisis.
Business Continuity Plan. BCP
An ongoing process supported by senior management and funded to ensure that necessary steps are taken to identify the impact of potential losses, maintain viable recovery strategies and plans and ensure the continuity of operations through training, plan testing and maintenance
Business Impact Analysis BIA
A management level financial analysis that ids the impacts of losing an org’s resources. It measures the effect of resource loss and escalating losses over time to provide data to base decisions on mitigation, recovery and business continuity strategies
Crisis
Any global, Regional or local natural or human-caused event or business interruption that runs the risk of
1) escalating in intensity
2) adversely impacting shareholder value or the org’s financial position
3) causing harm to people, damaging property or the environment
4) falling under close media or government scrutiny
5) interfering with normal operations and wasting management time or financial resources
6) adversely affecting employee morale
7) jeopardizing the org’s reputation, products, or officers and negatively impacting its future
SMART
Specific, Measurable, Aggressive but achievable, Realistic, Time-bounded
PACS
Physical Access Control Systems