SOLUTIONS GRADED A+
✔✔Design Basis Threat (DBT): - ✔✔Design Basis Threat = Maximum Credible Threat
✔✔5 Asset Categories - ✔✔Physical
People
Knowledge
IT
Clientele
✔✔Asset Criticality is... - ✔✔..the impact of a loss measured in dollars
✔✔Three PPS Design function are... - ✔✔Detection
Delay
Response
✔✔Detection without assessment is... - ✔✔Not detection
✔✔The 3 PPS objectives are... - ✔✔Facility Characterization - Physical site conditions
& procedures
Threat Definition
Target(Asset) Identification
✔✔The 3 Effective Measures for Response are: - ✔✔Interruption
Neutralization
Communication
✔✔EASI Model is defined as the: - ✔✔Estimation of Adversary Sequence Interruption
Model
✔✔How can the Critical Detection Point (CDP) be defined: - ✔✔The point on the path
where the delay time remaining exceeds the response force time
Where the minimum delay along the remaining path just exceeds the guard response
time
The account of time required for the detection of the adversary in order to get the
guards there in time to interrupt
✔✔ADS stands for: - ✔✔Adversary Sequence Diagram
✔✔Adversary Sequence Diagram is defined as: - ✔✔A graphical method to represent
the protection elements in a system
Show the paths an adversary may take to accomplish sabotage or threat
A graphical representation of the physical layers, the protection elements between the
layers and paths to an asset
, ✔✔System integration is... - ✔✔The process of combining individual technology
elements, procedures and personnel into one system for providing security.
✔✔Business Continuity is the comprehensive managed effort to: - ✔✔Prioritize key
business processes
ID significant threats
Plan mitigation strategies
✔✔Components of a BCP - PART 1 - ✔✔The planning process
✔✔Components of a BCP - Part 2 - ✔✔Implementing and Maintaining the plan
(Test / Train / Evaluate / Maintain)
✔✔The Business Continuity Recovery and Resumption Steps are: - ✔✔Damage and
impact assessment
Resumption of Critical and Remaining Processes
Return to normal operations
✔✔Chain link fencing is the: - ✔✔Most commonly used fencing
✔✔The most common perimeter barrier is: - ✔✔Fencing
✔✔Chain Link fence heights: - ✔✔5 - 6' = low security
7' to deter human penetration
18-20' = High Security
✔✔Chain link fence recommendations: - ✔✔9 GA or heavyer
Twisted and barbed selvages top and bottom
Openings = 2 x 2"
✔✔Examples of natural barriers include: - ✔✔Rivers / Lakes / Ponds
Cliffs / Canyons
Dense vegetation
Other difficulty to pass through terrain
✔✔Chain link fence installation recommendations: - ✔✔No more than 10' between
posts
No more than 2" between any building and fence post
24" minimum + 3" for every foot of fence heights above 4' (post depth)
Posts set plumb with 2,500 psi concrete extended 2" AG
Solid rock = 3x larger post holes. Half filled with Hydraulic / non-shrink concrete. Top
with regular concrete
✔✔Structural or natural barrier functions are: - ✔✔Define the protection area boundary