Classification of risk Assest, exposure, losses
3 criteria of cost/benefit analysis Cost, reliability, delay
Basic methods of fieldwork Observing, questioning, analyzing, verifying, investigating, evaluating
Business continuity planning (BCP) Readiness, prevention, response, recovery/resumption
process
Assign accountability, perform risk assessment, agree on strategic plans,
BCP process "readiness"
crises management
BCP process "prevention" Compliance with corporate policy, mitigation strtegies
Potential crisis recognition, notify teams, assess the situation, declare a
BCP process "response"
crisis, excute the plan, communication
Damage & impact assessment, resumption of critical & remaining
BCP process "recovery/resumption"
processes
BCP implementation & maintenance Test & train, evaluate & maintain
CPTED, physical barriers and site hardening, physical entry and access
General physical security measures control, security lighting, IDS, veideo surveillance, security personnel,
security policies and procedures
Designing PPS Determine objectives, Design PPS, Analyze design, redesign PPS
,Determine objectives Facility characterization, threat detection, target identification
Design PPS Detection, delay, response
exterior sensore, interior sensor, alarm assessment, alarm comm &
Detection (design PPS)
display, entry control
Delay (design PPS) access delay
Response (design PPS) response force, response force communication
Analyze PPS design Analysis/evaluation (EASI)
Target identification techniques Manual listing, logic diagram
Vital area indentification Fault tree
Probability of detection, time for communication & assessment,
Detection perfrmance measures
frequency of nuisance alarm
Delay performance measure Time to defeat obstacales
Probability of accurate communication to the response force, time to
Response performance measure communicate, probability of deployment to adversary location, time to
deploy, reponse force effectiveness
Exterior sensors vulnerability to Bypass, spoof
defeat
Passive or active, covert or visable, Line of sight or terrain following,
exterior sensors classification
volumetric or line detection, application
,Exterior sensor fence groups buried line, fence associated, freestanding
interior sensor classification Passive or active, covert or visible, volumetric or line detection
interior sensor application boundary-penetration, interior motion, proximity sensor
2 purposes of alarm assessment Determine cause of alarm, provide additional information
3 levels of alarm resolution detection, classification, identification
2 critical elements of alarm transportation of data, display of data in meaningful manner
communication and display
Permit only authorized persons to entry and exit, detec and prevent
Objectives of entry control
contraband, provide information ot facilitate assessment and response
Types of barriers Passive, guards, dispensable
Best height for barries 30 inches
Placement of roof barriers 10-12 inches below roof
general considerations, contingency planning, communication,
5 parts of response
interruption, neutralization
Quantitative (higher consequence of loss assets), Qualitative (lower
Types of PPS analysis
consequence of loss assests)
a residential environment whose physical characteristics fuction to allow
Defensible space
inhabitants to become key agents in ensuring security
2 basic social behaviors Territoriality, natural surveillance
, 3 phases of vulnerability assessment Planning, conducting, reporting
3 types of requirements in a system Fuctional, constraint, performance
(vulnerability assessment)
Risk assesments should include Risk analysis, risk identification, risk evaluation
2 types of protective barriers Natural, structural
Types of key operated locks Disc or wafer tumbler, pin tumbler, lever
Door lock types Mortise, rim-mounted, tubular, cylindrical, unit
Types of lock attacks Surreptitious techniques (picking), force
Attacks on bolts Jimmying, punching, sawing, peeling
attacks on cylinders pulling, lug pulling, twisting, drilling, punching, hammering
3 purposes of alarms Perimeter protection, area/space protection, spot/object protection
Example of perimeter alarm Door switches, glass break detectors, window screens
protection
Example of area/space alarm Ultrasonic, microwave, PIR
protection
Example of spot/object alarm proximity detectors, vibration detectors
protection
Security video systems aspect ratio 4x3 (16x9 wide screen)
2 types of video scanning Raster, digital or pregressive
3 criteria of cost/benefit analysis Cost, reliability, delay
Basic methods of fieldwork Observing, questioning, analyzing, verifying, investigating, evaluating
Business continuity planning (BCP) Readiness, prevention, response, recovery/resumption
process
Assign accountability, perform risk assessment, agree on strategic plans,
BCP process "readiness"
crises management
BCP process "prevention" Compliance with corporate policy, mitigation strtegies
Potential crisis recognition, notify teams, assess the situation, declare a
BCP process "response"
crisis, excute the plan, communication
Damage & impact assessment, resumption of critical & remaining
BCP process "recovery/resumption"
processes
BCP implementation & maintenance Test & train, evaluate & maintain
CPTED, physical barriers and site hardening, physical entry and access
General physical security measures control, security lighting, IDS, veideo surveillance, security personnel,
security policies and procedures
Designing PPS Determine objectives, Design PPS, Analyze design, redesign PPS
,Determine objectives Facility characterization, threat detection, target identification
Design PPS Detection, delay, response
exterior sensore, interior sensor, alarm assessment, alarm comm &
Detection (design PPS)
display, entry control
Delay (design PPS) access delay
Response (design PPS) response force, response force communication
Analyze PPS design Analysis/evaluation (EASI)
Target identification techniques Manual listing, logic diagram
Vital area indentification Fault tree
Probability of detection, time for communication & assessment,
Detection perfrmance measures
frequency of nuisance alarm
Delay performance measure Time to defeat obstacales
Probability of accurate communication to the response force, time to
Response performance measure communicate, probability of deployment to adversary location, time to
deploy, reponse force effectiveness
Exterior sensors vulnerability to Bypass, spoof
defeat
Passive or active, covert or visable, Line of sight or terrain following,
exterior sensors classification
volumetric or line detection, application
,Exterior sensor fence groups buried line, fence associated, freestanding
interior sensor classification Passive or active, covert or visible, volumetric or line detection
interior sensor application boundary-penetration, interior motion, proximity sensor
2 purposes of alarm assessment Determine cause of alarm, provide additional information
3 levels of alarm resolution detection, classification, identification
2 critical elements of alarm transportation of data, display of data in meaningful manner
communication and display
Permit only authorized persons to entry and exit, detec and prevent
Objectives of entry control
contraband, provide information ot facilitate assessment and response
Types of barriers Passive, guards, dispensable
Best height for barries 30 inches
Placement of roof barriers 10-12 inches below roof
general considerations, contingency planning, communication,
5 parts of response
interruption, neutralization
Quantitative (higher consequence of loss assets), Qualitative (lower
Types of PPS analysis
consequence of loss assests)
a residential environment whose physical characteristics fuction to allow
Defensible space
inhabitants to become key agents in ensuring security
2 basic social behaviors Territoriality, natural surveillance
, 3 phases of vulnerability assessment Planning, conducting, reporting
3 types of requirements in a system Fuctional, constraint, performance
(vulnerability assessment)
Risk assesments should include Risk analysis, risk identification, risk evaluation
2 types of protective barriers Natural, structural
Types of key operated locks Disc or wafer tumbler, pin tumbler, lever
Door lock types Mortise, rim-mounted, tubular, cylindrical, unit
Types of lock attacks Surreptitious techniques (picking), force
Attacks on bolts Jimmying, punching, sawing, peeling
attacks on cylinders pulling, lug pulling, twisting, drilling, punching, hammering
3 purposes of alarms Perimeter protection, area/space protection, spot/object protection
Example of perimeter alarm Door switches, glass break detectors, window screens
protection
Example of area/space alarm Ultrasonic, microwave, PIR
protection
Example of spot/object alarm proximity detectors, vibration detectors
protection
Security video systems aspect ratio 4x3 (16x9 wide screen)
2 types of video scanning Raster, digital or pregressive