GRADED A+
✔✔What is an alarm called when the source is unknown? - ✔✔False alarm. It could be
from equipment and is a form of nuisance alarms.
✔✔List four methods for accomplishing delay: - ✔✔1) People, 2) Barriers, 3) Locks, 4)
Activated delays.
✔✔The primary purpose of placing barriers before detections is: - ✔✔To force
adversaries to change or abandon their tactic. It is not delay.
✔✔____________ is defined as a sufficient number of response force personnel
arriving at the appropriate location to stop the adversary's progress. - ✔✔Interruption
✔✔1 PPS Performance Measure for Delay - ✔✔Time to defeat obstacles
✔✔4 PPS Performance Measures for Detection: - ✔✔1) Probability of detection, 2)
Time for communication and assessment, 3) Frequency of nuisance alarms, 4)
frequency of undetected intrusions or false negatives.
✔✔5 PPS Performance Measures for Response. - ✔✔1) Probability of accurate
communication, 2) Time to communicate, 3) Probability of deployment, 4) Time to
deploy, 5) Response force effectiveness.
✔✔Defense in Depth Definition - ✔✔AKA Layered Security. Series of complementary
security layers before reaching the target. 1) Outer, for example a fence, 2) Middle, for
example building and lighting, IDS, 3) Inner, for example people, procedures and doors.
✔✔List three effects of Protection-in-Depth: - ✔✔1) Increased uncertainty about the
system, 2) More extensive preparation prior to the attack required, 3) Additional steps
where the adversary may fail or abort the mission created.
✔✔Balanced protection means: - ✔✔That no matter how an adversary attempts to
accomplish the goal, effective elements of the PPS will be encountered and that all
security elements work together.
✔✔For a complementary balanced system, what two factors should be equal? - ✔✔1)
The minimum time to penetrate each barrier, 2) The minimum time to detect penetration
of the barrier.
✔✔What is a "Clear Zone"? - ✔✔The area within two parallel fences where the sensors
are inside, typically 10-15 yards.
,✔✔True or false: Detection is placed before Delay - ✔✔True.
✔✔Detection is most effective at the ______ and delay more effective at the _______. -
✔✔perimeter, target
✔✔For protection of critical assets, the total time for detection, delay, and response
must be less than... - ✔✔...the adversary's task time.
✔✔True or False: Feature-based design is better than performance-based design when
measuring overall system effectiveness. - ✔✔False - feature based may not meet
requirements of organization. Performance based leads to more competition.
✔✔What is an ordered series of actions against a facility, which, if completed, results in
successful theft, sabotage, or other malevolent outcome? - ✔✔An adversary path.
✔✔Critical Detection Point definition. - ✔✔The point where the delay time along the
adversary's path exceeds the response force time.
✔✔Adversaries will try to minimize _______ before the CDP and minimize _______
after the CDP. - ✔✔Detection, delay.
✔✔What is the path with the lowest probability of interruption? - ✔✔The critical path.
✔✔Risk avoidance definition. - ✔✔Eliminate the source of the risk.
✔✔Risk reduction definition. - ✔✔Reduce the vulnerability (e.g., site hardening). Is the
most expensive.
✔✔Risk spreading definition. - ✔✔Not having assets subject to a single threat.
Decreases impact. Combined with Avoidance by some authors.
✔✔Risk transfer definition. - ✔✔Transfer risk to another entity - insurance company,
vendor, neighboring building. Decreases impact.
✔✔Risk acceptance definition. - ✔✔Recognition that there will always be some residual
risk.
✔✔Design Basis Threat definition. - ✔✔Assessing assets, adversary's skills,
tools/tactics, pathway an adversary might use. Same as Maximum Credible Threat.
✔✔The process of identifying specific locations, actions, or assets to be protected to
prevent undesirable consequences. - ✔✔Target identification.
, ✔✔The 4 performance measures for sensors are? - ✔✔1) Probability of detection, 2)
Nuisance Alarm Rate or NAR, 3) vulnerability to defeat, measured from 0-1, 4)
Confidence level, 90-95 is common.
✔✔What are used to deliver sensor outputs and display the information to reduce the
load on human operators to assist their performance during malevolent events? -
✔✔AC&D systems.
✔✔Explosives detection includes what 2 techniques? - ✔✔1) Bulk, 2)Trace.
✔✔What is one of the tools that may be used to achieve balance and to establish
protection in depth (layered security) at a facility? - ✔✔Entry control.
✔✔4 forms of credentials to used to validate a person are? - ✔✔1) Something you
know, 2) something you possess, or 3) something you are, 4) something you do like
typing.
✔✔What is one of the most effective ways to reduce response time and the cost of
delay upgrades? - ✔✔Consolidating assets into a single area.
✔✔What is a graphic representation of the penetration path of an adversary into a
locked building? - ✔✔Adversary sequence diagram (ASD).
✔✔What is a more in-depth study, including risk management, analysis of risk factors,
environmental and physiological security risks, and analysis of crime patterns, fraud,
and internal theft? - ✔✔security risk analysis
✔✔What are the functions of a structural or natural barrier? - ✔✔Define, delay, detect,
deny
✔✔Minimum heights for medium and high security fences? - ✔✔7 feet and 18 feet.
✔✔What 3 types of measures or actions can PPSs be classified into? - ✔✔1)
Preventative like delay, deter - physical/psychological, reduce vulnerabilities, 2)
Corrective like reduce impact - monitoring/response/emergency plan, restore ops, 3)
Detective like trigger measures, distinguish between authorized/unauthorized.
✔✔What are the 3 types of procurement actions and the type of specification that aligns
with each? - ✔✔1) Sole source, 2) request for proposal, RFP or RFQ, which uses
functional or performance specification, 3) invitations to bid which uses feature based
specifications and only includes product and installation cost.