Chapter 1: Introduction Flashcards

(63 cards)

1
Q

The part of security concerned with physical measures that have been designed to protect people, equipment, materials, and documents from damage, loss, or unauthorized access.

A

Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A detailed instruction for carrying out security policies, often presented as lists or steps to take.

A

Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Anything of value to the organization. It can have tangible and/or intangible properties such as physical objects, people, or information.

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Prevents the use of an incorrect key entering or turning a lock mechanism.

A

Ward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A noteworthy happening such as a security incident, safety situation, medical emergency, or similar occurrence.

A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Deter - always the first objective
Detect - must include assessment
Delay - begins after detection and communication to the response force
Deny - prevent access

A

The Four Ds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

An individual who has the intent to harm a person or facility. There are two types; an outsider and an insider.

A

Adversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Cease the actions of an adversary.

A

Neutralize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Also referred to as layered protection or protection-in-depth, __________ is a fundamental concept used in physical security. It consists of placing multiple layers of concentric security features that provide 360-degree protection without gaps or weaknesses. It is important that each layer of security has the same level of protection all the way around the asset, including above and below the asset, which is referred to as having “Balanced Protection”.

A

Defense-in-depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A natural or manmade object designed to restrict or impede movement of animals, people, or vehicles and/or materials.

A

Barrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of implementing perimeters to control and document people, vehicles, and materials for a protected area.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A surveillance system that captures visual images and then transmits the images to monitors, recorders and control equipment. Includes CCTV (Closed circuit television) and network-based video systems.

A

Video Surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The threat (tactics, weapons, tools, explosives, or expertise) against which assets must be protected. It is the design of the protective measures and procedures to prevent the threat from being successful.

A

Design Basis Threat (DBT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ______ is the point where the delay time exceeds the response force time. Simply put, it is the time it takes for the detection and response functions to interrupt (stop) the adversary before they can compromise or destroy an asset (deny).

A

Critical Detection Point (CDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One or more buildings that are related by function and location to form an operating entity.

A

Facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Facility layout and utilization
Protection strategy
Structural and electronic security systems
Security officer operations and other human support
Physical security program management

A

Concept of Design Elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of assessing security-related risk from internal and external threats to the organization, its people, or its assets.

A

Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A Physical Protection System.

A

PPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A practice or device that is designed to protect people, assets, or information from damage, loss, or unauthorized access.

A

Security Measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Placement of hazardous materials
Air intake and exhaust design
Utilities including; water, electric, natural gas, communications, sewer, drainage culverts, etc.
Neighboring facilities and operations
Contingency planning
A

Key Design Considerations for Planners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An indication or event that can result in a loss, damage, or unauthorized access to an asset. Can be terrorism, vandalism, theft, bombing, etc.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An occurrence or action likely to impact assets.

A

Security Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Knowledge and theory applied to practice

A

Cognitive Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attitude/perception of cultures, adversary, and asset protection

A

Affective Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Physical skills/hands-on training
Psychomotor
19
___________ are bodies of principles for the officer. They include items such as prohibiting smoking, eating, and personal cell phone use while on duty and how they will maintain their post, wear their uniform, and use company equipment.
General Orders
20
_________ conversely, may be developed to address special events such as a board meeting, holiday party, or public function. These orders have a specific timeframe and scope.
Special Ordes
21
__________also known as Standard Operating Procedures (SOPs), are the most important document for the security force as it will list officer duties, explain any policies and procedures and provides a basis for training. These orders should be written clearly and be easy to understand, using the following criteria as a guide: Each order should deal with a single subject. Each order should be concise. Each order should be easy to understand. Orders should be indexed based on content. Orders should be available at every post. Orders should contain a coordinated set of instructions (no contradictions).
Post Orders
22
Four Main Areas Policies Address:
General - general objectives, responsibilities of staff, accountability, reporting, auditing, etc. People - workplace violence, emergency evacuation, prohibited items, security awareness, etc. Property - acceptable use of equipment, investigations, key control, safeguarding property, etc. Information - disclosure, marking, storage, handling, destruction of documents, etc.
23
Statements of a principle that each employee must follow while performing business functions
Policies
24
Detailed instructions on how to perform daily work, often using a step-by-step process or a written list of duties.
Procedures
25
Three Main Areas Procedures Address
People - response to threats, evacuations, visitor management, employee access badging, etc. Property - securing assets, marking property, key issuance, officer duties (post orders), etc. Information - marking, storage, and destruction of information and technical surveillance countermeasures (anti-eavesdropping), etc.
26
Measures based on a reference, with two or more points (quantity over time) and that offers insight into performance, operations, or quality.
Metrics
27
Are legally defensible and enforceable; Comply with other organizational policies and procedures; Follow best industry practices by demonstrating duty of care; Conform to national, state, and local laws and regulations; and Protect the staff and organization from lawsuits.
Legal considerations
28
Events or actions that may cause loss, harm or damage, that are known, or should have been known, to the organization and/or the security officers before the event occurred
Foreseeability
29
When an officer is the immediate cause of an injury to a victim
Proximate Cause
30
When officers engage in unreasonable conduct
Breach of Duty
31
When officers engage in conduct beyond their duties
Failure to Adhere to Duty Guidleines
32
The Four Ds of security: (What is the 5th?)
Deter, Detect, Delay, Deny
33
_______ consists of multiple security measures around an asset.
Layered protection or protection in-depth (defense-in-depth)
34
_______ protection means that all protective measures are evenly deployed around an asset.
Balanced protection
35
Defense-in-Depth (Protection-in-Depth or Layered Security) when applied in a basic format has three layers of protection:
1) outer layer, 2) middle layer, and 3) inner layer.
36
_______ is the basis of PPS design used to protect an asset by analyzing adversary skills, tools, tactics, and the pathway an adversary might use to compromise the asset.
Design Basis Threat (DBT)
37
________ is the point where the delay time exceeds the response force time.
Critical Detection Point (CDP)
38
___________ should be balanced between the various forms of security measures (structural, electronic, and procedural) to be effective.
The Physical Protection System (PPS)
39
__________ can be defined as any site where the outer perimeter is loosely controlled, and the primary focus is on individual buildings within the perimeter or spaces within the buildings.
Point security
40
___________ is where the perimeter and entry portals have a higher level of control and security features.
Area security
41
____________ for each subsystem or component is based on the contribution the device or component makes to the overall PPS performance.
Performance criteria
42
_____________ relies the fact that the component is present, not on the performance of that feature or component.
Feature-based criteria
43
______________ is tasked with protecting property, enforcing rules, and directing pedestrians and vehicular traffic.
The security officer
44
During a partial bomb evacuation, the security officer should focus on .......
the floor involved with the suspected bomb, and the floors immediately above and below the floor involved.
45
________ security services are often less expensive than proprietary security officers.
Contract
46
A simple formula that can be used to determine if an armed security officer is needed
1) that there is a greater danger to life safety without the armed officer 2) the security officer may reasonably be expected to use fatal force.
47
Learning can be separated into three distinct domains
: 1) cognitive learning, 2) affective learning, and 3) psychomotor learning.
48
Education + Training + Guided Experience
Development
49
There are three kinds of orders that direct security officer operations
1) general orders, 2) post orders, and 3) special orders.
50
_______ orders are the most important written document for the security force, because it lists officer duties, policies and procedures and provides a basis for training.
Post
51
Policies address four main areas
1) general, 2) people, 3) property, and 4) information
52
Procedures address three main areas
1) people, 2) property, and 3) information
53
_________ are strategic principles that must be followed and require approval at the executive level.
Security policies
54
_________are steps to accomplish day-to-day tasks in meeting policy requirements and change more often than policies. Post Orders (SOPs) are an example of this.
Security procedures
55
Security officers have two main types of metrics ______ and ______
1) response metrics, and 2) training metrics.
56
Training metrics comprise ______ programs and ______ programs.
1) inward facing programs, and 2) outward-facing programs.