Chapter One Flashcards

(41 cards)

1
Q

The Integration of People, procedures, and equipment deployed to safeguard people, property, and information and to prevent unauthorized access to assets

A

Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four D’s of Physical Security?

A

Deter
Detect
Delay
Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Of the 4 D’s which is always the first objective?

A

Deter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What must be included in the Detect portion of the 4 D’s?

A

Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What must happen for an event to be considered detected?

A

You must be able to determine what caused the event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What consists of placing multiple layers of concentric security features that provide 360-degree protection without gaps or weaknesses?

A

Defense-in-Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Defense-in-Depth what is consider the simple approach?

A

To use three main layers, the outer layer, the middle layer, and the inner layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IN regard to Defense-in Depth what does the outer layer typically consist of?

A

barriers, protective lighting, signage, and intrusion detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of control measures at the perimeter in regard to Defense-in-Depth?

A

They typically define the property boundary and channel both people and vehicles to the designated access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Defense-in-Depth. What does the middle layer typically comprise?

A

The exterior of the building on the site and may include doors, windows, building facade, walls, and other opening such as ventilation intakes and skylights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Defense-in Depth. What does the Inner layer typically consist of?

A

Window and door protection devices, barriers, and reinforced walls/doors, access control devices, intrusion detection systems, video surveillance, protective lighting, and signage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Regarding Defense-in-Depth where are the highest valued assets located?

A

The inner layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What must you know in order to calculate the effectiveness of the physical security feature also known as the Design Basis Threat (DBT)?

A
  1. Identify the assets to be protected
  2. The adversary’s skills including tools and tactics
  3. The pathway the adversary might use.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the critical detection point (CDP)?

A

The point where the delay time exceeds the response force time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should the concept of design follow, as a minimum?

A
  1. Facility Layout and Utilization
  2. Protection Strategy
  3. Structural and Electronic Security Systems
  4. Security Officer operations and other human support
  5. Physical Security Program Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is point security?

A

When the outer perimeter is loosely controlled and the primary focus is on individual buildings within the perimeter or spaced within the buildings, such as restricted areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Area Security?

A

A site where the perimeter and entry portals have a higher level of control and security features.

18
Q

What are the key considerations planners should consider when designing a site of facility?

A
  1. Placement of hazardous materials
  2. air intake and exhaust design
  3. utilities including water, electric, natural gas, communications, sewer, drainage culverts, etc.
  4. neighboring facilities and operations
  5. Contingency Planning
19
Q

What are three main contemporary challenges with security professionals?

A
  1. Standards and Guidelines
  2. Emerging Technology
  3. Security Education
20
Q

What does Defense-in- Depth consist of?

A

Multiple security measures around an assett

21
Q

What does balanced protection mean?

A

all protective measures are evenly deployed around an asset.

22
Q

What is Design Basis Threat?

A

The basis of PPS design used to protect an asset by analyzing adversary skills, tools, tactics, and the pathway an adversary might use to compromise the asset.

23
Q

What is PPS?

A

The Physical Protection System

24
Q

What needs to happen to make the PPS effective?

A

It should be balanced between the various forms of security measures (structural, electronic, and procedural)

25
What is the performance criteria for each subsystem or component based on?
The contribution the device or component makes to the overall PPS performance.
26
What does fesature-based criteria rely on?
The fact that the component is present, not on the performance of that feature or component.
27
What is a security officer typically tasked with?
Protecting property, enforcing rules, and directing pedestrians and vehicular traffic.
28
During a partial bomb evacuation, what should a security officer focus on?
The floor involved with the suspected bomb, and the floors immediately above and below the floor involved.
29
Which it typically less expensive, contract security services or proprietary security officers?
Contract
30
What is the formula used to determine if an armed officer is needed?
1. There is a greater danger to life safety without the armed officer 2. the security officer may reasonably be expected to use fatal force.
31
What three domains can learning be seperated into?
1. cognitive learning 2. affective learning 3. psychomotor learning
32
What is the formula for development?
Development=Education+Training+Guided Experience
33
What are the three types of orders used to direct security officer operations?
1. General Orders 2. Post Orders 3. Special Orders
34
What types of order are the most important written document for the security force?
Post orders
35
What do Post orders contain?
A list of officer duties, policies and procedures and provide a basis of training.
36
what four areas do Policies address?
1. General 2. People 3. Property 4. Information
37
What three main areas do Procedures address?
1. People 2. Property 3. Information
38
what are security policies?
Strategic principles that must be followed and require the approval at the executive level.
39
What are security procedures?
steps to accomplish day to day tasks in meeting policy requirements and change more than policies.
40
What two metrics are used for security officers?
response metrics and training metrics
41