• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/251

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

251 Cards in this Set

  • Front
  • Back

What are the eight main categories of physical security measures?

1. CPTED


2. Physical barriers and site hardening


3. Physical entry and access control


4. Security lighting


5. Intrusion detection systems


6. Video surveillance


7. Security personnel


8. Security policies and procedures

Loosely, what is CPTED?

A sociological theory/practice which proposes that proper design and effective use of the built environment can lead to a reduction in the opportunity, fear and incidence of predatory crimes while improving the quality of life.

What are the underlying CPTED understandings?

All human space...


1. Has some designated purpose;


2. Has social, cultural, legal or physical definitions that prescribe the desired and acceptable behaviors; and


3. Is designed to support and control the desired and acceptable behaviors

What are the three classifications of CPTED strategies?

1. Mechanical measures


2. Organizational measures


3. Natural or Architectural measures

Define: Mechanical Measures

Hardware and technology systems such as locks, security screens, fencing, key control, video surveillance, etc. Must not be solely relied upon but used in context with people and other strategies. Provide physical protection and discouragement.

Define: Organizational Measures

A focus on policies and activities that encourage observation, reporting and - where appropriate - intervention. Includes education, patrol, and other rules. Provides heavy deterrence.

Define: Natural/Architectural measures

Designed space enduring the overall environment works more effectively for the intended users while deterring crime.

What strategies (6) does CEPTED employ to make a site less desirable for illegitimate activity to develop?

1. Natural access control


2. Natural surveillance


3. Natural territorial reinforcement/boundary definition


4. Management and maintenance


5. Legitimate activity support


6. Compartmentialziation

Discuss: Natural access control

Employing physical and symbolic barriers to discourage or prevent access/movement towards specific access points (e.g. doors, fences, signs)

DiscusS: Natural surveillance

Increasing interior-to-exterior and exterior-to-interior visibility to enhance witness potential, foster a sense of exposure, and give advance visibility to entrance. Increases feelings of safety for legitimate users and risk of detection for illegitimate users.

Discuss: Natural territorial reinforcement/boundary definition

Establishing a sense of ownership to increase vigilance in identifying who belongs on premises. Increasing psychological ownership thus encouraging users to defend. Eg. Low edgeing shrubbery along a pedestrian walkway marks the territory and discouraging trespassing.

Discuss: Management and maintenance

Maintaining spaces to look well-tended and crime-free. (Broken Windows Theory)

Discuss: legitimate activity support

Engaging legitimate occupants in the desired or intended use of the space.

Discuss: Compartmentalization

The use of concentric layers of security to enact defense-in-depth techniques. (For test, Protection-in-depth)

What constitutes the outer layer of a facility?

The perimeter including fencing, protective lighting, signs and intrusion detection systems. This includes underground parking.

What are the 4 D's of the Outer Layer?

1. Deter


2. Detect


3. Delay


4. Defend (or respond)

What are controls on the Outer Layer designed to do?

Define the property line and channel people/vehicles through designated access points.

What constitutes the Middle Layer?

The exterior of the building on the site including lighting, intrusion detection systems, locks, bars on doors/windows, signs, fencing and the facade. This includes openings under the structure such as manholes.

What constitutes the Inner Layer?

Generally several different inner layers. Anything inside the building designed to address an intruder who gets past the Middle Layer.

List some examples of a natural barrier

fields, creeks, rivers, lakes, mountains, cliffs, marshes, deserts

List some structural barriers

berms, ditches, artificial ponds, canals, planted trees and shrubs, fences, walls, doors, roofs, glazing material.

What is a clear zone?

An area that separates a perimeter barrier from structures inside the protected area. Size should be determined based on facility. Exceptions can be made when a building wall constitutes part of the perimeter barrier.

Aside from keeping people out of a given area, what else should a barrier do?

Keep people in a given area (and keep them from taking stuff OUT of a given area!)

What are some things that a fence or a wall can do?

- Give notice of legal boundaries


- Channel entry though a secure area


- Provide an IDS installation zone


- Deter casual intruders


- Force an intruder to demonstrate intent


- Cause an access delay


- Create a psychological deterrent


- Increase possibility of detection


- Demonstrate concern for safey

What needs to be avoided for a chain-link fence to be effective?

1. Overly large mesh fabric


2. Undersized wire


3. Lightweight posts and rails


4. Shallow post holes

What are the height requirements for low, medium and high security facilities?

Low: 5-6 feet


Medium: 7 foot


High: 18-20 feet

How should barbed wire be installed to discourage human trespassing?

Atop the fence on an outward facing top guard at a 45 degree angle.

What does a properly anchored bottom rail do?

Prevents an intruder from forcing the mesh up to crawl under it.

Describe a top rail, and any benefits or problems it poses? Also, what's an alternative?

Horizontal member of a fence top to which fabric can be attached with ties or clips at intervals not exceeding two feet. Improves the appearance of a fence, but offers a hand hold for climbing over. Tension wire is an alternative.

Why would you use color fabric on a chain link fence?

It enhances visibility, especially at night.

Where should a double fence be placed?

10 to 20 feet inside the perimeter fence.

What kind of fence is this? What are the benefits? What are the types?

What kind of fence is this? What are the benefits? What are the (4) types?

Expanded metal fence


Does not unravel and is difficult to climb.


1) Standard or regular; 2) grating; 3) flattened; 4) architectural or decorative

What is a cheaper alternative to expanded metal fences?

Welded wire.

List the 7 major types of fence

1. Chain link
2. Expanded metal


3. Ornamental


4. Barbed wire


5. Concrete


6. Wooden


7. Electrical

What is the difference between barbed wire and razor/concertina wire?

Barbed wire is straight and can construct the whole fence, razor/concertina wire is coiled and used for top guards. Also the shapes of the barbs.

If a fence is constructed of barbed wire and meant to deter, how should it be constructed (height, post distance, top guard)

At least 7' high (w/o top guard), posts less than 6' apart, and a robust topguard.

What are the drawbacks of a concrete block fence?

poor to moderate protection, easily scaled, unattractive, enhances concealment.

When are wooden fences generally used?

Very low security operations

What is necessary in a wooden fence?

It must be difficult to climb and have sufficient strength. Can be enhanced by a top guard of some sort.

When using a wooden fence to delay entry, how must it be constructed

Vertical picket sections must be no wider than 1-3/4 inches, horozontal sections 50 inches apart located on the protected side of the building.

What is the generally accepted range of variation for # of wires in electrical fencing?

5 for low-security up to zoned 50-thread fences.

What is the typical construction for an electrical security fence?

8' high with 20 wires, fitted to the inside of the chain link perimeter fence

What are the two types of electric fences?

1) live wire "deterrent" that relies on fear


2) "monitored" fence (w/ integrated alarms) that also have cut/climb detection

How often is a pulse discharged into electric fences?

about 45 times per minute

How far apart should you place bollards?

3 feet

What does a K4, K8 and K12 rating mean?

K4: barrier can stop a 15,000 lb. vehicle traveling at 30 mph
K8: 15,000 lb. vehicle at 40 mph


K12: 15,000 lb. vehicle at 50 mph

Give some examples of Annealed glass

plate, float, sheet, rolled, some patterned

What is the safety concern surrounding annealed glass?

It breaks into large shards and can cause serious injury

How does tempered glass break?

Fragments into small pieces rather than shards because it has been treated

What is the purpose of wired glass and where is it usually used?

It can resist breakage against large objects but may still shatter. It's generally used in and designed for fire doors.

How is laminated glass composed?

Two sheets of glass bonded to a middle layer(s) of plastic sheeting material.

How does laminated glass break?

Can crack and break but generally adheres to plastic.

What is bullet/burglar-resistant glass?

Laminated glass with multiple plies of glass, polycarbonate and other plastic films to provide extra ballistic resistance

List some other window-related security measures

1. Window Bars
2. Window film
3. Blast curtains
4. Security shutters

What are the key factors in hardening a facility

1. Stand off distance (dist. b/t critical assets and nearest point of attack - usually re: exploisons)


2. Structural integrity of the premises against attacks


3. Prevention of progressive collapse


4. Redundancy of operating systems

List the 8 kinds of locks

1. Mechanical


2. Electrified


3. Electromagnetic


4. Credential-operated


5. Combination


6. Biometric


7. Rapid entry


8. Key

What are the two major components of most mechanical locks?

Coded mechanism and the fastening device

What is a coded mechanism?

Key cylinder (key lock) or wheel pack (combo lock)

What is a fastening device?

Latch or bolt assembly

What is an electrified lock?

Allows a door to be unlocked by a remote device such as a button, motion sensor, card reader, keypad or biometic device. Can be mechanical or electromagnetic

What is an electromagnetic lock

electromagnet and armature plate adhered to door frame and door. Current passing through holds the door shut.

How does a streetlight illuminate?

Downward in a circular pattern

How does a searchlight illuminate?

very narrow high-intensity beam concentrated on a specific area

How does a floodlight illuminate?

medium to wide beam on a larger area. Often used on perimeters

How does a fresnel light illuminate?

narrow, horizontal beam.

How does high mast lighting illuminate?

70 to 150 feet high in a wide area, like in a parking lot or along the highway.

Incandescent light


efficiency
price
lifespan

least efficient
most expensive to operate
short lifespan

Fluorescent


efficiency


used where

more efficient than incandescent lamps


not used extensively outdoors

Halogen and quartz halogen lights


efficiency compared ot incandescent

25% more efficient

Mercury vapor lights


problem with output


color rendition


lifespan

take several minuets to produce full output


poor color rendition for video surveillance


long life

Metal halide lights


Imitate what?


Good or bad w/ video surveillance?


Color rendition

Imitate daylight


Good with video


Good color rendition

High-pressure sodium lights


Efficiency


lifespan


color rendition


Good in what conditions?

Very energy efficient


long life span


poor color rendition


allow for good detail vision in fog

Low-pressure sodium lights


efficiency


price


color rendition

even more efficient than high-pressure


expensive to maintain


poor color rendition

LED lights


have potential for what?

furnishing a cost effective alternative means of lighting that lasts longer without sacrificing illumination

induction lamps


lifespan


used where?

Long lifespan


used mainly indoors except in parking structures, underpasses and tunnels

How does a position detection system work?

Device detects when one part is moved away from the other.

List the 5 types of motion detection sensors

1. Microwave


2. Infrared


3. Dual-technology motion


4. Ultrasonic


5. Beam

What two kinds of technology are combined in dual-technology sensors?

Microwave and infrared. Disturbance are required in both before alert is activated

What are the 7 main elements of a video surveillance system?

1. Field of view


2. Scene


3. Lens


4. Camera


5. Transmission medium


6. Monitor


7. Control equpiment

When was ASIS founded and what doe sit stand for?

1955


American Society for Industrial Security

Is there a trend toward arming or disarming guards?

Disarming

What are some advantages of contract services?

cheaper, easier administration, flexible staffing fewer unions, more impartial and more likely to have expertise

What are some advantages of proprietary services?

Quality of the people, control, keener on loyalyt, prestige

What are the 4 components of a hybrid system?

1. Engaged corporate liaison (e.g. Mickey)


2. Consistent contract management support


3. Periodic review


4. Accurate quality measurements

What are the 3 keys to a successful contract force?

1. Accessibility (24x7)


2. meetings


3. Resource management

What level of power and authority do security officers have?

Generally, the same level as a private citizen unless otherwise outlined by the state.

What is vicarious liability

Respondeat superior. When the supervising agency is held responsible for the actions of an employee that is acting on their behalf - out of common low. Doesn't normally extend to contract employees.

What kind of liability is most often leveraged against security guards?

Criminal liability

What is a charge shared by the police and security guards?

Entrapment

Define risk management

Making the most efficient before the loss arrangement for an after the loss continuation of business

What are the 4 steps for developing a good risk management program?

1. Identify risk through analysis of threats and vulnerabilities


2. Analysis of risks (probability and severity of event)


3. Optimization of risk management alternatives


4. On-going program study

What are the (5 +1) risk management alternatives/options?

1. Risk avoidance


2. Risk reduction


3. Risk spreading


4. Risk transfer


5. Self-assumption of risk


6. Any combo of the above

What is the risk equation?

threat * vulnerability * impact on asset value = risk

What are the steps in risk analysis?

1. Threat Assessment


2. Threat evaluation


3. Select security countermeasures


What kinds of windows and doors need special attention?

Anything less than 18' up

What does an operational audit do?

1. finds deviations from established security standards


2. Finds loopholes in security controls


3. considers means of improving efficienct of control

Probability and criticality are _____ measures that can be placed on ____.

a. subjective


b. continuum

During an assessment, what should you do if probability or criticality cannot be ascertained?

assume them to be fatal and certain

What is risk avoidance

removing the problem by eliminating risk

what is risk reduction

decreasing the potential ill effects of safety and security problems when it is possible to avoid them

What is risk spreading?

Decentralizing a procedure or operation so that safety problems at one location will not cause a total loss

what is risk transfer?

Removing the risk by paying for protection. Insurance.

What is self asusmpiton of risk?

planning for an eventual loss without he benefit of insurance

What do name/position bonds cover?

Specific employees so that they must perform in good faith. Any loss the the company will be stood up by the bonding company.

What is surety coverage/performance bonds

Protection for failure to live up to contractual obligations.

What is 3-D coverage?

Comprehensive dishonesty, destruction and disappearance coverage. Designed to provide widest possible coverage in cases of criminal attack of various kinds.

What do portfolio commercial crime policies do?

Act as a one-time deal to cover a huge variety of possible issues, ranging from kidnapping to internal crime, to liability for guests' property.

Is there cyber liability coverage?

Not specifically, but can be part of a an errors and omissions policy since these kinds of issues generally arise during the performance of services. Also as an extension under property or crime insurance.

What are the best methods for convincing a manager that security is worth spending money on?

1. Open a dialogue to ascertain how they feel about it


2. Maintain objective neutrality and stick to non-attribution


3. Stay professional and relevant


4. Make proposals brief and interesting


5. Admit when outside help is necessary

What size openings should be protected?

Anything larger than 96 square inches, anything less than 18' from the ground, or 14' from nearby structure

Re: UL-listed polycarbonate glazing...


what keeps glass from fragmenting?


what is typically used to make it burglar resistant?

2 mm


4-6 mm

What is the required thickness of Acryllic/plexiglass for it to be considered bullet resistant by UL listing?

1 1/4 inches

How deep into a jamb must a locking bolt throw to be effective?

At least 1 inch

How can you protect against pulling?

install hardened steel key cylendar guard


install cylinders flushed or inset to avoid popping

Spring lock

Holds door shut for privacy, security value is negligable. Can beat with credit card

dead latch

holds a spring lock in place when a door is closed. Spring lock w/ nubby. More effective but still not very

Warded lock

keyway is open and can view through. Pre WWII

Pin and tumbler lock

irregular keyway w/ grooves on both sides of key. Master keyable. Delay is 10 min or less

Lever lock

variety of purposes and effectivenesses. Best in safe deposit boxes. For all intents and purposes pick proof but bulky and expensive

What are the 3 elements to a good key management program?

1. Key creation


2. Usage


3. Breach policies

What are the 5 kinds of cards

1. Magnetic coded (sheet between plastic or along edge)


2. Wiegan effect (short-length magnetic wires, up to 26 pieces)


3. Optical coded (bar codes, now usually only visible under ultraviolet light)


4. Prox (message sent via magnetic, optical or ultrasonic pulses)


5. Radio Frequency ID: prox w/ radio frequency

What is the lighting necessary for a starlight camera?

0.0001 lux

What is the generally required illumination for CCTV?

not below 20 to 40 or above 250 fc. If below 20, need extra lights, if above 250 need special filter.

What should chain link construction be made of?

9-gauge or higher wire with twisted and barbed selvage top and bottom. No more than 2 inches from the ground.

How can you prevent someone climbing under a fence and what is this thing usually made of?

Metal poles or concrete sills usually precast with AWF #9 wires for ties

How should barbed or razor wire be installed?

three strands angled at 45 degrees from the building. Should be tall enough to increase the height of the fence at least 1 foot, to overall +7'. Y-shaped top guard if any nearby structures are more than 10' high

How are Amico fences different than normal fences?

Holes are cut into a metal sheet

What are the normal measurements for barbed wire?

13.5 gauge, twisted double strand with 4-point barbs 4 inches apart.

What would be the K-rating of hydraulic defenses and how quickly do they deploy?

K12. Deply in 1-3 seconds.

What should be focused on when designing lighting?

Produce sufficient light to create psychological deterrent to intrusion and make detection virtually certain

What is the best kind of lock for high security doors with traffic?

Electric strike

What is the minimum fc for all parking facilites?

3 fc

1. What should be the fc for gates?


2. and thoroughfares?


3. What should the lighting around a pedestrian gate be?


4. vehicle gates?

1. 2 fc


2. .10 fc


3. 25 feet on either side


4. 50 feet

How should primary entrances be dressed?

With panic hardware (assume emergency exit) and (at least local) alarm to protect against surreptitious use

What is a single pass system?

Single badge or pass given to an employee who keeps it until changes are made or leaves company

What is a pass-exchange system?

Employee exchanges one (color coded) pass for another prior to entering a restricted area

What is a multiple pass system?

same as a pass exchange system, but changes take place every time the employee enters a new security area

How are record safes classified?

Maximum interior temperature permissions after exposure to heat for varying periods of time.

What can a UL 350-4 (class a) safe withstand?

Exterior temps up to 2k F, for 4 hours without permitting the inside to rise above 350 F

What are the allowed temps for...


1. Paper


2. Magnetic tapes


3. Flexible computer disks?

1. 350 F


2. 150 F


3. 125 F

What do record safes tend to have that provide a measure of burglary resistance (even though still not as good)

combo locks, relocking devices, and hardened steel lock plates

What can a UL rated TL-15 money safe withstand/do?

Weighs up to 750 pounds and the front face can resist attack by common hand and electric tools for at least 15 min. Some explosives as well.

Related to money safes, what do these stand for?


1. TL


2. TRTL


3. TXTX

1. Hand tools


2. + torches


3. + explosives

In a money safe rating, what does the number indicate?

Minimum amount of time the safe will stand attack in minuets

What are the door measurements on a typical vault?

Between 6" and 24"

What are vault rules as related to walls?

Double the door thickness, never less than 12"

What kinds of alarms are most common in safes and cabinets?

Capacitance and vibration

What are the three kinds of alarms?

1. Intrusion


2. fire


3. Special use

What are the three common elements of every alarm?

1. Alarm sensor


2. Circuit or sending device


3. Enunciator or sounding device

What are the 6 kinds of monitoring systems?

1. Outsourced central station


2. Proprietary


3. Local (noise or light in immediate area. think fire)


4. Auxillary (to emergency system)


5. Local alarm-by-chance


6. Dial alarm system

What are the three contingency categories of impact?

1. Business infrastructure


2. People


3. Reputation

What are 10 important elements to any contingency plan?

1. Assumpitons


2. Risk assessment


3. Types of hazards


4. Critical process ID


5. Business impact analysis


6. Emergency response (know role)


7. Incident/crisis management (CMT)


8. Incident/event analysis


9. Business resumption plan (short term, long term)


10. Post event evaluation

What are the two general parts of a fire plan?

1. Fire prevention


2. Fire protection



note: one of the most demoralizing kinds of disasters

A. Heat


B. Fuel


C. Oxygen

What is the fireload?

The amount of combustible crap inside a building

Define ignition temperature

The temp. at which solid fuel will ignite without direct flame contact. Most items are between 400 an d600 F

Name and briefly describe the 3 stages of fire

1. Incipient - moment the fire begins when everything combines at the right rate for the right period of time


2. Free burning - Fire DGAF


3. Smoldering - air or fuel reduced to point were no flame is visible, just tremendous heat

Name the classes of fire


A


B


C


D


K

A. Ordinary crap. Water/water fog best. Cool below ignition point.


B. Liquid fuel fires w/o some oils. O displacement (such as CO2) or water fog. Normal water spreads


C. Live electrical equipment. Nonconductive agent. Disconnect power first.


D. Combustible materials. Dry powder


K. Cooking oils. Too hot to be B class

What kinds of extinguishers are prohibited?

Soda/acid and carbon tetracloride along with anything that needs to be inverted

What kind of fires can these work on...


1. Dry Chemical


2. Multi-purpose dry chemical


3. Dry powder


4. Foam


5. CO2


6. Wet agents

1. B and C


2. A, B, C


3. D


4. A, B


5. B o C


6. Vary

What are the 2 kinds of smoke detectors?

Photoelectric (beam or refraction) and ionization

what are the 2 kinds of heat detectors?

Fixed temperature and rate of rise.

What are the 4 kinds of fixed temp detectors?

fusible link, frangible bulb, contiuous line and bimetallic

What are the three kinds of rate of rise detectors?

Pneumatic, rate compensaton, thermoelectric

What are the five types of sprinkler systems?

Wet (heads won't close. Shut off water to stop)


Dry (mostly for heated systems)


Pre-action (detectors activate, system charged after valve opens)


Deluge (same as above, but heads always open)


Cyclic (thermostat opens and closes heads. Keep fires in smoldering)

What are the three Es of a safety program?

1. Engineering (of the program)


2. Education


3. Enforcement

What is the idea behind an F-MRI?

a series of scans show the difference in blood flow operating under the theory that it takes more cognitive effort to lie

What are the 3 Cs of Cargo theft?

1. Confusion


2. Conspiracy


3. Common denominator

What are the 3 levels of intensity re: workplace violence?

1. Active/Passive refusal to cooperate w/ superiors. Gossips. Rude.


2. Argues increasingly w/ everyone. Refuses P&P. Steals & sabotages. Speaks about hurting others. Me vs. them mentality.


3. Frequently displays intense anger. Recurrent suicidal threats. Physical fights. Weapons. Crimes against people

What are the three levels of international terrorism?

1. Individual. Criminal motivation


2. Group. Organized w/ some kind of leadership, recruitment, training and retention of members


3. State. Establishes specific agency or uses legit. state institution for gaining benefits.

Principles for recruiting Jihadits

1. Identify person w/ appropriate ideology


2. Indoctrinate


3. Cultivate desire for jihad


4. Training and prep

Types of terrorist groups1

1. Criminal


2. Mentally deranged


3. Political

What are the 3 kinds of LANs?

1. Ethernet (no other traffic allowed on network before sending transmission)


2. Token Ring (Pass token around network based on physical location to enable transmission)


3. ARC net (same as above, but based on network address)

WAN


1. What does it mean?


2. How connected?


3. What made possible?

1. Wide Area Network


2. large geographic spread usually connected through phone lines


3. the invent of IP with the ARPAnet

Briefly describe TCP/IP

TCP divides info into sequential packets, sent to recipient via IP over network, TCP checks for errors and asks for retransmissions, then reconstructs the packets

What are the three major elements of safeguarding data?

Integrity, confidentiality, availability

Which title of the patriot act covers Identity theft?

Title 3

What was authorized by the Computer Fraud Abuse Act (1986)? What does this kind of trespass equal in court?

the FBI National Computer Crime Squad (only covers federal computers). Trespass equals a felony..

What is a computer-room friendly alternative to water in sprinkler systems? What did it replace?

FM-200. Replaced Halon

Why should't you use carbon dioxide in computer room sprinkler systems?

The people inside will suffocate

What are the three things that can be used for authentication?

1. What a person has


2. What a person knows


3. what a person is

What is DES encryption?

a 56 bit algorhythm to protect federally unclassified info

What is RSA encryption?

512-bit key

What is the defacto internet algorg. standard?P

PGP

1. What is the point of Skipjack?


2. How does it work?


3. What has CALEA mandated?

1. Provided by NSA to replace DES


2. Clipper chip (in comp. chip) allows LE to access the key w/ the chip


3. CALEA mandates that LEA has right to break encryption

What is the mandated bit-encryption for all US Gov't transmissions?

128 bits

What are the 3 types of risk

1. Personal (people)


2. Property (material)


3. Liability (legal) - can affect both of the above

When determining probability of a hazard, 1,000 days =?

3 years

What are the three basic considerations before choosing a security countermeasure?

1. Cost


2. Reliability


3. Delay

Tiered secuirty design

Makes exceptions in case something doesn't work. "We will do A first, if that doesn't work we'll install i, ii, and iii to take it up to B. A will cost $X and B will cost $Y."

What are the 8 critical sectors?

1. Telecommunications


2. Transportation


3. Water supply


4. Oil and gas


5. Banking and finance


6. Electrical generation


7. emergency services


8. Essential government functions

What is the basic outline of a survey report?

1. Purpose


2. Scope


3. Findings


4. Conclusion


5. Recommendations

What are the four phases of emergency management?

Mitigation, preparedness, response and recovery

What is in a security proposal?

1. Introduction to facility


2. Proposal


3. Management


4. Cost

As part of the proposal, what might be included under the "proposal" section?

Security objectives; losses; security organization, regulations and procedures; the gard force; personnel security; physical security conditions, and many other things

What are the 4 types of design strategies?

1. Territorial defense


2. Personal defense


3. Law enforcement


4. Confidence restoration

What are the basic CPTED processes?

Natural surveillance


Natural access control


Territoriality

What are the steps of a vulnerability assessment?P

Planning, kickoff meeting, protection objectives, data collection - detection/delay/response, analysis

What are the three methods by which an adversary may attempt to gain entry?

Stealth


Force


Defeat

What is the best rating on the Color Rendition Index (CRI)?

100%

What is the breakdown of lighting cost?

88% energy


8% capital


4% maintenance

1 fc = ? lumens/ft2

1 fc = 1 lumens/ft2

How many lumens are required for...


outer perimeter?


restricted areas


vehicle entrances


pedestrian walkways

.5 fc


.4 fc


10 fc


5 fc

How many lumens are required for...


roadways


open yards


decks on open piers


interior sensitive structures

.5 - 2 fc


.2 fc


.2-5 fc


10 - 20 fc

How many lumens are required for...


loading docks (interior & exteriror)


shipping and receiving


Security gate houses


Anywhere with cash collection

15 fc


5 fc


25-30 fc


5 fc

What is the minimum fc necessary for...


detection


recognition


identification?

.5 fc


1 fc


2 fc

What is the construction of a basic chain link fence?

Concrete posts, 3 barbed wire strands at a 45degree angle up and out, concrete curb plant with an inside slant to shed water.

What is the construction of a basic personnel door?

Hollow steel composit with 18 gauge metal facing, butt hinges with non-removable pins.

What is the construction of a basic security class door?

3/4" steel on one side 1/8" on teh other with 3" fiberglass inside.

What are the three vehicle door options?

1. Corrugated steel roll-up :(


2. Sliding :|


3. Articulated :) (like a garage door on steroids)

How wide and deep should a moat be, and what would be the proper shape? How can you defeat a 20' ladder with one?

Should be 8' deep 10' wide. U not V shaped. Double up with fence on the top to thwart the ladder >> UU

What is a shedding combination?

A key combo that allows for it to be removed before the tumblers are properly aligned.

What is a useful combination?

Any key combo that can be used (some vannt be for various reasons)

How many useful combos are there in locks with...


3 pins


4 pins


5 pins


6 pins

~130


1,025


8,200


65,500


(never more than 23% of possible combos)

What is a paracentric keyway?

When the wards on either side of a key pass the centerline

Diameter and break strength for...


11


9


6


gauge fences

.120" and 850lbs


.148" and 1290 lbs


.192" and 2170 lbs

Smaller mesh sizes are harder to... while heaver gauges are...

Smaller mesh sizes are harder to climb and cut, while heavier gauges are harder to cut.

What is the most secure mesh and gauge combo? Least secure?

Most: 3/8" 11 gauge


Least: 2" 9 gauge


(1/9 > 1/11 > 2/6)

What are the 3 ways fire can spread?

1. Conduction: direct contact


2. Convection: flow of fluid/gas to cooler areas of the room


3. Radiation: heat travels via electromagnetic waves and ignites nearby items.

What are the OSI layers? What is the mnemonic?

7. Application alligator


6. Presentation pet


5. Session Susan's


4. Transport touch


3. Network not


2. Data link do


1. Physical please

What is TCP designed for?

To reconstruct lost packets and keep the communication in place

What is UDP designed for? What kind of files use it?

Sends data w/o error correction or resending lost packets. Used for video and audio. With RTP ensures streaming data. Evidently messes up frequently.

What is this?


What is the range for the bytes?

What is this?


What is the range for the bytes?

IPv4


0 - 255

What is the range for a byte in IPv6?

0 - 4095


NOTE: total 12 bit value. Each byte = 3 bits

In IPv4...


First 1 or 2 bytes =


3rd =


4th =

1 or 2 = network number


3rd = number of subnet


4th = host device number on network (cannot be 0 or 255)

What would an IP address of 0.0.0.0 indicate?

Nothing. There is no hardware address

What is a less stupid term for communication media? Give some examples

Cables. Ethernet, UTP, four pair wiring w/ RJ45 connector

What are the wavelengths for single-mode and multipmode fiberoptics?

single-mode: 1550 and 1310nm (lasers)


multi-mode: 850nm (LED)

10 base = xx Mbps

10 base = 10 Mbps

1000 base = xx Gbps

1000 base = 1 Gbps

What are the 3 kinds of adversaries?

1. Insiders


2. Outsiders


3. Outsiders working in collusion with insiders

When does human effectiveness wane related to alarm assessment? When is it completely ineffective?

Wanes after 30 min


Completely ineffective after 60

What are the 5Ds describing how to deal with an intruder (in order that you should try them)

Deter


Deny


Detect


Delay


Destroy

What are the 3 management dimensions

Technical Expertise


Management ability


Ability to deal with people

What are the five manegerial functions?

Planning


Organizing


Directing


Coordinating


Controling

Describe the span of control principle

One person can only supervise a limited number of people effectively. The exact number depends on the nature of the work, but generally this is assumed at about 10 people.

What are the levels in Maslow's Hierarchy of needs? Starting at the bottom

1. Physiological


2. Security (from harm)


3. Affiliation


4. Esteem


5. Self actualization

Describe McGreggor's theory of X and Y

Th X: workers are lazy, must be goaded into working


Th Y: workers are naturally motivated and want to succeed



Th Y programs are better

In Herzberg's Motivation-Hygiene theory what is the opposite of satisfaction?

No satisfaction (not dissatisfaction)

In the Motivation-Hygiene theory what two factors determing motivation, attitude and success

1. Job content (motivators)


2. Job context (hygienes)

In the Motivation-Hygiene theory how do the motivators and hugienes function on workers?

Hygiene moves people from dissatisfaction > no satisfaction


Motivators move people from no satisfaction > satisfaction

What does a fideltiy bond protect?

Employee dishonesty

What does a surety bond protect?

Guarantees credit or performance of some obligation by an individual

What is a 3D policy?

Combo fidelity and crime polocy to protect as wide as possible. Five insuring agreements can help define coverage, plus 12 additions.

What are the basic components of an analog system?

1. camera


2. Coax cable or any other electronic signal carrier


3. monitor

What are the basic components of a digital system?

1. camera


2. digital electronic signal carrier, such as a Cat5 cable


3. PC w/ viewing/recording software

What is a basis of design?

A document that conceptualizes the very basics of a system

What is the LaPlace formula?

States that where events are independent, the probability of simultaneous occurences is the product of their separate probabilities.

What are some things that should be considered for the Design Criteria?

codes and standards, quality, capapcity, performance, features, cost, operations, culture and image, monitoring and response, preliminary cost estimates

What % of total is maintenance and warranty?

Typically 11%

What are the steps in a business continuity plan?


(C N A D E C R)

Crisis recognition


Notification


Assess the situation


Declare a crisis


Execute the plan


Communicate


Resource management