ASIS CPP "Physical Security " Flashcard help in Exam

 ASIS CPP "Physical Security "

Flashcard help in Exam




Best protection available to a company: well-trained/supervised security personnel

Greatest access failure: failure to identify persons. (Waiting room: visiting truck drivers)

Visitors are to be escorted by their counterpart

Security personnel: largest single expense in the security operation

Measurers for improving security: training, improved selection, wages, and lic./reg.

Career (in-house) personnel: inflexible, limited pool of manpower resources

(-) Contract personnel: high turnover

(+) Contract personnel: less expensive, more flexible

Armed guards: justified only where there is danger to life safety

Post orders: the most important written (lowest level) instructions for the guard force.

Value of patrol: observation, reporting, apprehension, and prevention- (least Important).

Guard log: guard’s primary record of significant events.

Guard tours: systematically unsystematic.

Dogs: reduces cost; and, psychological impact (ineffective at gas sites).

Wheel covers or hubcaps: least likely search area.

Upgrading quality of security personnel: most frequently cited recommendation

Training programs for new employees: conducted by security personnel

Training required: for new equipment/processes, change in responsibilities, drop in productivity, or an increase in safety violations/accidents

Training: educational, informative, skill development to impact comprehension or behavior

Security manuals: to be put in the hands of all proprietary and contract security personnel, and others expected to implement security procedures

Supervisory training shortcoming: failure to equip new supervisors with necessary tools

Disturbed persons handling policy: reduce the disturbed person to a form of benevolent

custody,and eliminate the immediate danger

Physical security planning: Deter and delay

Physical security survey: oriented toward the security of property and facilities

Security in depth: placing of progressively more difficult barriers/obstacles

3 lines of defense : property line (outer barrier), building exterior (middle), interior controls

Criticality and vulnerability: determines degree of protection desired in any installation

Vulnerability study: establishing priorities in the protection of assets

Crime prevention surveys: deterrence of criminal activity

Cost-benefit analysis: costs of security operations vs. savings/ reductions

Non cost effective security measures: never to be recommended

Intrusion detection systems sense: interruptions in an electrical circuit or light beam, sound, vibration, or a change in capacitance

Types of security zones: restricted, controlled, and unrestricted

Systems integration of protective measures: primary objective of security system design

4 areas of protection: grounds, building perimeter, building interior, and building contents

MTBF: mean time before failure (basic measure of system reliability)

MTTR: mean time to repair (basic measure of maintainability)

Enunciator: alarm signal board

Dwell time: length of time per image on a sequencer monitor

Microwave system: radio waves are transmitted and partially reflected back

Microwave sensor: based upon the Doppler effect

Microwave motion detectors: not impacted by air turbulence; penetrates non-metal

Capacitance system: electrostatic field around the object to be protected

Ultrasonic (sound wave) sensors: not influenced by exterior noise; reacts to movement and fire-air

Acoustic detectors: not impacted by air turbulence, vibration, or outside motion

Electro-mechanical sensors: current -carrying conductor; foil placed on glass

ESDA: electro-static detection apparatus

Electro mechanical transducers: used to sense alterations in fence fabric

Piezoelectric transducers: uses piezoelectric crystals to convert impacts into electrical signals

Geophone transducers: convert mechanical vibrations into analog electrical signals

Electric cable transducers: sensitized coaxial cable

Balanced magnetic switch: balanced magnet mounted to a door or window frame

Contact switches: magnetic or mechanical switches used on doors and windows

Contact microphone: responds only when the protected object or surface is disturbed

Parabolic microphone: disk attachment used for listening at great distances

Dynamic microphone: small microphone not requiring a power source

Passive infrared (PIR): most widely used device; requires an unobstructed view

Duress alarms: wireless or hard-wired for the protection of people

Hand geometry Identification: based upon the length of fingers and width hand

Biometric systems: fingerprint, retinal, speech, hand geometry, and signature

Biometrics advantages: Personal Identity Verifier (PIV), constant traits, integration

Electromagnetic locks: no moving parts

Pin tumbler lock: most common interior/exterior lock

Wafer lock: generally used in automobiles, desks and cabinets

Warded lock: oldest mechanical lock with least value

Tumbler code potential: total numbers raised by the number of tumblers

Fail-safe locks: open when power fails (allows people to get safe)

Fail-secure locks: lock when power fails (vault)

Multiplexing: transmission of several simultaneous messages on the same medium

Time division multiplexing (TDM): events one at a time over a shorter distance

Frequency division multiplexing (FDM): simultaneous, multi-channel, longer distance

Pen register: provides records of all calls dialed from a particular phone

Safes and vaults: neither provide both fire and burglary protection

Safe attack: drilling, manipulation, and peeling

TRTL: torches and tools

Burning bar: produces a large volume of smoke.

Relock: automatically stops the bolt mechanism from operating upon attack

Delay: Depends greatly on adversary’s tools and techniques

Penetration efforts begins: 2 ft (.6 m) in front of the barrier and ends 2 ft. (.6m) beyond it

Barrier penetration time depends: hand tools, powered tools, abrasive water jets, thermal cutting tools, vehicles

Compartmentalization: the use of barriers to segregates and physically protect valuable materials or information

A clear zone of 20 ft: should separate a perimeter barrier from exterior structures, parking areas and natural features

A clear zone of 50 feet: Should separate a perimeter barrier from structures within the protected area

Barriers (commonly utilized): accident, by force, by stealth

Less than 18 feet above the ground or 96 square inches or larger: invite penetration

First line of defense: located at outer edge of property

Second line of defense: walls, ceilings, roof and floors of building themselves

Third line of defense: Interim areas

Perimeter protection: first line of defense

Perimeter barrier: prevents/impedes aggressor from crossing a perimeter boundary

Strong room: interior room constructed of solid materials (i.e., a safe for people)

Fencing (4): chain link, concertina, barbed wire, and barbed tape

Glass: weakest area within a window

Laminated glass: street-level windows or displays; intervening layer of plastic material

Spalling: small pieces without sharp edges (Auto Glass)

Illuminating Engineering Society: all lighting must be in compliance with this organization

Protective lighting purposes: psychological, object illumination, and physical deterrent

Continuous lighting: overlapping cones of light; down and away; small areas

Lighting considerations: floodlights, searchlights, streetlights, and fresnel lenses

Outdoor security lighting: continuous, standby, movable, and emergency

Lumens: light output

Luminance: intensity of light

Florescent lighting: good color; temperature sensitive (low temperature/low efficiency)

Incandescent: good color; low cost/efficiency; short life (house lamp)

Gaseous discharge lamps: mercury vapor (soft blue: street lights); sodium vapor (soft yellow: fog)

Metal halide: same as mercury vapor

Quartz lamps: instant start; very bright light excellent for perimeter barriers

Perimeter fence lighting: located within the protected area, and above the fence

Protective lighting: object illumination, psychological, and physical deterrent

Glare method: light glares into the eyes of a potential intruder

Reinforced concrete walls: most resistant to explosion blast

Expanded metal for (security barrier construction)

Expanded metal: discourage (break in attempts)

Glazing (refers): installation of transparent glass or plastic in construction

Glass (types): sheet, plate and float

Glass Primarily (manufacture) to resist (wind pressure and breakage)

Tampered glass (treated): to resist breakage (safety and security purpose)

Use (T/glass): passage ways, entrance doors, adjacent panels

Wired glass: resistance to (impact of longer objects) with risk of injury

W/glass (used): installation (interior and exterior), required by (fire and safety code)

Laminated glass: highly shatter distant

L/glass (useful): areas (vulnerable to explosions)

L/glass (installation): street level windows / displays, door ways

Laminated security glass: protect (smash and grab attack)

L/security glass: (5/16 inch thick) interlayer (high resistance plastic)

acrylic material (plexiglass): less than half weight of glass

plastic glazing (categories): acrylic and polycarbonic

Polycarbonate sheets: weight 50 – 60 percent less than glass

Polycarbonate (used): in laminated glass

Bullet resistance (BR) glass: laminated provide (ballistic resistance)

Security lighting (purpose): psychological deterrent to intrusion

Lumens: output or quality of light emitted

100 watts (household bulb): output (1700 lumens)

Illuminance: concentration of light over a particular area

Illuminance (measured): in lux

one foot candle = 10.76 lux (ration about 1:10)

Lux: number of lumens per square meter or foot candles

To perceive a scene: evaluate (amount of light or its illuminance)

Reflectance: see an object when light reflected from that object

For silhouette: no reflection required to see

Object illuminated (other than white light): see object (colors)

Color of surface has (impact): on reflectance

Parking lot (paved in concrete): higher reflectance

Parking lot (paved in asphalt or black top): less reflectance

Reflectance (measurement): ratio (quality of lumens felling and reflected)

CRI : ability of a lamp reproduce the colors seen in an object

CRI important in CCTV display: apprehension and prosecution of criminals

CRI (70 to 80) Good

CRI (above 80): excellent

CRI (100%) daylight

Corrected color temperature (CCT): a measure (warmth or coolness of light)

CCT has (impact): on (mood and ambiance of surroundings)

Lighting system (compound): lamp, luminaries, mounting hardware, electrical power

Lamp (include): filament, its glass casing, its electrical connectors

luminaries (fixture): lamps, holder, reflectors and diffusers

Diffusers (used): to distribute and focus light

Mounting hardware (used): to fix (luminaries at correct height and location)

Technology (sensitive to reduced voltage): high intensity discharge (H/D)

3 Lamps (HID) family: mercury vapor, metal halide, high pressure sodium

Lamp (types): incandescent, halogen and quartz halogen, fluorescent, mercury vapor, metal halide, high pressure sodium, low pressure sodium

Incandescent: at residence, most expensive to operate, least efficient

Incandescent 100%: excellent (CRI), short life time

Halogen and quartz halogen: incandescent with 25% better efficiency and life

Fluorescent (used): outdoors (except for signs)

CRI 80% above (excellent): incandescent, halogen and q/halogen, fluorescent

CRI 70-80% good: mercury vapor lamps

Mercury vapor lamps: CRI heavy on blue (pass electricity through gas)

Metal halide: gaseous, imitate daylight, colen naturals (100%)

Metal halide (used): sports stadiums

most expensive light to install and maintain: metal halide

metal halide (with CCTV): CRI (excellent)

Lamps (gaseous): metal halide, h/pressure sodium, pressure sodium

CRI (poor): high pressure sodium lamps

High pressure sodium (used): on street and parking lots and in fog conditions

High pressure sodium (allows): to see more detail at greater

High pressure sodium (make): things / yellow

High pressure sodium: very long life and energy efficient

Low pressure sodium lamps: make (color unrecognizable)

Low pressure sodium (produce): a yellow gray color

H/D lamps (require): starting and re striking time

H/D lamp require (starting / R-striking time): because (they rely on arc to produce light)

Lighting acts as: deterrent to unauthorized intrusion

Design solution perimeter lighting (consider): regarding (light trespass)

building façade (illumination): floodlighting (provide high contrast)

Higher light source (provide): horizontal illumination

Lighting consideration (rule of thumb): for pedestrians or normal cameras for detection (0.5 fc), recognition (1.0 fc), identification (2.0 fc)

Identification verification / access control (types): guards, card reader, systems, biometric readers

guards (make): A personal recognition (through judgment)

card reader: compare the coded card with the computer records

biometric readers: use of a person’s physical property

large access control system (include): operator’s terminals

L/A control (function) Admit or reject cards for entry

Alarm (if an unauthorized entry or exact attempt is made)

Alarm when penetration is made without using a card

Make a permanent transaction record

Print real time events and historical logs

Modern card system should (embody): validity, reliability, ease of use, tamper resistant, longevity

Reliability: system must correctly identify an individual each time

Card readers (must popular): read magnetic coding

Coded cards (types): magnetic stripe, watermark magnetic, barium ferrite, weigend and proximity

Magnetic stripe cards: readers sense the magnetic energy present in or absent from (a minute field)

Card (difficult to defeat): watermark magnetic cards

Card (vulnerability to sabotage): barium ferrite

Weigend card: more secure than magnetic stripe cards more secure than magnetic stripe cards

Card (not effected by magnetic field): weigend

Proximity card (compatible): people who have disabilities

Card (types): resonant circuits, radio frequency readers, biometric, Hollerith, smart card resonant circuits, radio frequency readers, biometric, Hollerith, smart card

Resonant circuits (use): electronic surveillance of merchandise and stock control

Radio frequency readers: long range proximity reader

R/F readers (application): electronic article surveillance

R/F readers (push bottom transmitter): lock / unlocks car

Biometric (utilize): unique physical data about the person

Smart cards: (personal indemnification device)

Smart cards (contain): all information need to identify (in its chip memory)

Anti pass back feature (use): for large business compiler (has a high value work)

Employees authorized to enter (high value are): where door has anti pass back feature

Basic ingredients (alarm system): Sensors

Intrusion detectors (divided): (perimeter or point of entry), (general area), and object

Sensors (designed to): initiate alarms

Outdoor sensors (temperature range): - 30 OF to 150 OF

Most widely used (intrusion detectors): PIR

PIR’s (detect object): either warmer or cooler against (background temperature)

PIR function (based on): temperature variations

Temperature (for winter country) PIR (detect): warmer object (room cooler)

Warmer climate (PIR detect): cooler object (room hotter)

PIR (see): invisible, bold colors of thermal infrared (IR)

Key to (design and installation): avoiding source of false alarms

PIR (use): indoor

Pyro electric sensor: Produces an electrical output when subjected to a change in IR energy

Primary consideration (avoid false alarm): proper installation

PIR (mounted location): intruder pass (across its field of view)

For PIR (common sources of false alarms): drafts and insets

Air (from vents or drafts): should not flow (directly on the unit)

For PIR (direct sunlight): cause false alarms

Avoid PIR (mounting): where it see (a bright window or direct sunlight)

Glass breaks sensors: Largely (replaced foil):

Breaking glass produce (sound wave frequencies): 3 to 5 KHz

B/glass produce (seismic shock frequencies): 200 Hz

Acoustic sensors (capable sense): Acoustic and seismic frequency ranges

Less susceptible to (false alarms): due to (simultaneously listen and feel)

Acoustic Glass breaks sensors (installed): on walls or ceilings

A/G break sensors (best detection): installed or a wall (opposite protected glass)

Glass / B shock sensors (feel): wave generated by breaking glass

G/B shock sensors (installer attached): directly to a protected pane

G/B sensors (appropriate choice): for protecting glass (in loud, occupied rooms where acoustic sensors prone to false alarms)

MM/Switches (protected): accessible openings (such as doors, windows and sky lights)

MM/switches (installed): on (protected or secure side)

MM/switches (two part): one installed (opening surface) another fixed surface

Ultrasonic Sensors (based on): Doppler effect (h/frequency sound wave)

Microwaves or sound waves are (disturbed): (when movement changes signal frequency between Tx/Rx)

Alarm (initiated): when a distortion of the wave pattern caused by movement

Ultrasonic/S (not influenced): by exterior audio noise

Ultrasonic/S (reacts only): to movement (within a protected area)

Will not cause alarm: movement beyond (walks of protected area)

U/S (cause false alarm): Air Current, such as those from (air conditioning)

U/S sensor (usually limited): to indoor application (where types of movements are less varied)

As with a PIR, an U/S detector (detect): a lock in or concealed intruder (by that person’s movement)

U/S sensor (doesn’t alarm): if cabinets or container placed flush against a wall

Microwave sensors (principle): based on (Doppler effect)

Microwave sensors (utilize): high frequency electromagnetic energy

M/sensor (not affected): by (heavy fog, rain, snow, sleet, air, turbulence, drafts, noise, temperature, entrances or atmospheric disturbances

M/sensors (application): both (indoor and outdoor)

M/sensor (used): for (area protection) by wave patter (flood)

M/Sensor (used): for (perimeter protection) by narrow beam

Microwave (disturbed): if a movement, the waveform changes

microwave beam (can be blocked) or diverted: by (metal objects)

Microwave can (penetrate): nonmetallic construction material (plaster walls)

microwave (can detect): movement outside (non metallic objects)

Capacitance sensors: Large electric condenser (radiate energy)

C/sensors (detects): change in the (capacitive coupling)

C/sensors (connected): directly to an object (to be protected)

C/sensors (generally use): to protect ( a safe or file cabinet)

C/sensors (cause alarms): when intruder (who touches the object) because it disturb the circuit

PIR (can detect): intruder: long before (intruder reaches a protected object)

Capacitance sensors now (replaced by): PIR sensors

C/Sensors still (preferred protection): if critical to limit the field of detection (just to the protected object)

Shock and vibration sensors (application): object protection

Shock and vibration sensors: same technology (glass break shock sensors)

S/V sensors (detect): vibrations caused by intruder (attempt to penetrate wall)

Alarm discriminator (used): so that vibration / outside the protected space or surface) is disregarded

P/electric sensors (principle): based on (modification of a light level or interruption of a light beam)

Infrared filter (used): so only invisible light is transmitted

Light source or receiver strength: need amplified: distance longer than 500 to 1000 feet

To counteract (circumventing device): receiver frequented

Stages of fire: incipient stage, smoldering stage, flame stage, heat stage.

Incipient stage: invisible combination, no visible (smoke, flame or heat)

Smoldering stage: visible (combustion as a smoke) heat / flame (not present)

Flame stage: flame (exist), not yet appreciable heat

Heat stage: uncontrolled heat, rapidly expanding air

Fire sensors (type): thermal (heat), smoke (photo electric), flame (ultraviolet), product of combustion (ionization), fusible element device, water flow indicators

Thermal sensor (type): fixed temperature, rate of risk

Fixed temperature responds: on predetermined temperature

Rate of rise (respond): to (increase in heat) at a rate (greater than predetermined value

Smoke sensor (activate): an alarm (when obscuration) due to (smoke accumulation in the air)

Flame detectors (activate): alarm (when spectral field reached the predetermined color, in ultraviolet range)

Product of combustion (responds): to (early change in ionization) (electric change in the air)

Fusible element device (involve): frangible material or those with very low melting temperature

Water flow indicators (installed): in sprinkler system risers

W/F indicator (activate alarm): when water flows in the system

A major task for AP professional / addressing: relevant concerns (when considering a communications application)

Every communication S/professional (concerned): with (integrity of medium, integrity of message, timeliness of Tx, message security)

Message (security) accessibility of the communication to authorized person only

Integrity of (message): complete errorless transmission of data

Alarm signal (transmitted): on unshielded pair of (DC conductors)

Size and resistance of wire (must considered): Resistance varies directly with length of line Inversely with diameter of wire

Wire resistance (limits): effective (length of a line)

Audio signals (transmitted): on shielded twisted pair of (AC types wires)

Audio signals and audio transmission both (may be transmitted): on shield twisted pairs of (AC types wires) / refer voice grade lines

Alarm signals and audio transmission both (may be transmitted): on shield twisted pairs of (AC types wire refer voice grade line

Optical fiber (transmit): larger volumes of information (at speed of light

Optical fiber (used): to carry voice grade signals, video signals, digital on grade, digital on date grade signals

Optical fiber (not affected) by: electromagnetic interference (EMI) or radio frequency interference (RFI)

Optical fiber: Do not carry (electric current), do not (radiate signals)

O/F (carry): more different multiplexed message

O/F: must small and lighter than (conventional wires)

O/F: flexible and can take (an irregular course from point to point)

O/F (not vulnerable): to interception by (acoustic or inductive coupling)

Video Signals cannot be (transmitted): directly on DC lines

V/Signals (cable transmitted): on (coaxial and optical fiber) cable or (on standard telephone line) or (on balanced twisted wire pairs)

For coaxial cable transmission (doesn’t require further processing): if transmission distance short (typically 1,000 feet)

Real time transmission (possible): if transmission path is via optical fiber and telephone signal in digital format

Transmission installations (types): loop, point to point, multiplex

Three types (may be used): with (proprietary wire network or leased telephone line)

In a loop system (devices installed): on a pair of wires

Signal at control center (indicate) when (abnormal situation occur on the loop)

Loop system (adequate for): a small space or a single facility

Better method of transmission (in loop system): is to code the signal from each detector (so that source of each signal can be defined at the central point)

Short circuit or broken connection on the loop (can be partially corrected): by using a McCulloh circuit.

Point to point installation is connected: directly to a control center by a pair of wires

Point to point installation (more expensive though loop system): because more wire is required

With loop system (all detectors in an area could be disabled): by interrupting the loop at the proper location

Multiplexing (is a technique): to transmit several message simultaneously (on the same medium)

Multiplexing (transmission medium): can be (wire, radio frequency, microwave / OF)

Multiplex installation (cost effective) than (loop or point to point) installation

Multiplex installation (cost effective) because (a multiple signals are transmitted over long distance to a control center)

Multiplexing (two methods): Time Division Multiplexing (TMD), Frequency Division M (FDM)

With TDM, each sensor or data source is assigned a time segment

With TDM, each sensor (can transmit): only during its assigned segment

In FDM, signals from a number of sensors (on a common transmission line): occupy (defined portions of the frequency spectrum)

Even though transmitted simultaneously: their different frequencies keep them (individually identifiable at the receiver)

To protect communications: 1. Outside wiring should be installed (underground)

2. Inside wiring should be installed (in conduits)

A wire alarm system (should be designed) with line supervision to check the circuits automatically and immediately signal line faults

Simplest (line supervision) is: a end of line resistor

End of line resistor (introduce): a constant, measurable electrical current

Line supervision (detects): Open circuit (broken connection), aground (wire or wire short)

Any unscrambled or unencrypted communication transmitted by wireless technology (considered): available for interception

Microwave and laser technologies (rely on): line of sight

Microwave (can penetrate): main, fog and snow

Microwave (is not affected): by man made noise

Proper signal reception (depends): on the ability of the equipment (to discriminate wanted signals) from unwanted signals and noise

Interference (common cause): signal from other transmitter, and atmospheric industrial) noise

Security Survey: Critical on-site examination to ascertain the present security status, identify deficiencies or excess, determine the protection needed

Reason for: Proper security is worth spending some money to obtain

Can be termed as: risk analysis & risk assessment

Cost benefit analysis: Direct comparison of the investment for security and reduction of losses

2 steps of traditional building planning process: programming, schematic design

Drawings: Cornerstone of any constructions project

Floor plan (scottish plan): shows a top down plan

Elevations (views of vertical surfaces): to show mounting heights and locations of wall mounted devices

Risers: representation of complete sub systems

Risk assessment techniques: determine the types of loss or risk, estimate the Probability of Occurrence, quantifying the loss occurrence

Risk analysis: is process of identifying asset values, threats and vulnerabilities to ascertain risks

Risk analysis (goal): Risk mitigation option

Risk: Potential for loss or damage

Risk (based on): Likelihood of threats or hazards

Risk assessment (provides): Risk profile

No security program should be implemented: without identifying the assets of the company trying to protect

Security Risk = Asset value rating x Threat likelihood rating x Severity of incident rating x vulnerability rating

Risk management: Determining measures and safeguards to mitigate the threats and reduce vulnerabilities including cost benefit analysis

Threat: the intention to cause damage

Hazard: is a source of potential danger

Loss event profile: list of the kinds of threats affecting the assets to be safeguarded

3 distinct category of threats or loss event: crimes, non criminal events, consequential events

Assessing severity: prevention, control & recovery

Frequency estimation: Keys to risk measurement

Vulnerability: Any weakness that can be exploited by an aggressor

Vulnerability assessment (requires): Asset and threat pair

Risk mitigation (options): Risk assumption, risk avoidance, risk limitations, risk transference and site hardening

Cost benefit analysis: final state of conducting a security risk analysis

Probability: Is a mathematical value which is never greater than 1

Frequency: number of time an event could happen

Likelihood: How likely an event is to happen

Criticality: the value of an asset

Lost income: determine the amount of lost interest

Cost avoidance: the approach used by risk management in determining how much risk an enterprise retains and how much it insures

Pure risk: Events which are loss only oriented

Professional vulnerability assessment involves: analysis of the procedure, identify the weakness, lack of control over information

Threat logic pattern: Countermeasures planning indicate that although several problems have been separately stated a single countermeasures may neutralize them.

Function of PPS: Detection, delay & response

Detection: most effective at the target

Detection: is not complete without assessment

Deter: Purpose to make the target unattractive to the potential adversaries

Deny: access of any unauthorized person will be denied

Detection: How quick a system is to detect an illicit entry (most important for PS)

Delay: once detected, placing various obstacles to delay before response

Protection in depth: to accomplish the goal, an adversary should be required to avoid or defeat a number of protective devices in sequence

Corrective measures: reduce the effect of an attack by allowing a rapid and effective response

Design elements: Architectural aspects, security systems, and operational factors

Design criteria: Identify the characteristics that the security system will have in terms of performance and operational factors

Output of design: Bid Package or construction documents

Bid package: Bidder’s instruction, specification, drawing and schedules

Form of specification: General, products and the execution

Budgetary estimates: Prepared during the initial planning phase

Life cycle cost estimates (include): engineering and design, hardware, software, installation, operation, maintenance, miscellaneous, service interruption, end of life

CPTED design to (reduce): crime opportunity and fear of crime through (natural), (mechanical) and (procedural means)

CPTED best applied (using): a multidisciplinary approach

CPTED is (based on): common sense and a heightened awareness (about how people) use their space (for legitimate and criminal intentions)

The rising importance of CPTED: in (design and planning process)

CPTED is best of management tools (targeting): place, behavior, design & use of space

CPTED congruent with security mission: of deterring, detecting, delaying

CPTED (addresses): (the design of physical space)

Design of physical space (support): the legitimate and intended users of the space, minimize predictable behavior of offenders,

CPTED solutions (through): mechanical, human & organizational and natural measures

Natural measure (provide): specific guidance for the use of space

Natural measure (include): natural access of control, natural surveillance, natural territorial reinforcement

CPTED (additional solutions): management and maintenance, legitimate activity

Broken Windows theory: leaving broken windows or other decay markers unattended or unprepared can lead to the impression of abandonment and increase crime opportunity as no capable guardian is observed

To be effective (CPTED) program must engage: Stakeholders, especially residents, (in identifying CPTED strategies for specific places) that are defined, designated, and designed (known as 3D concept) for specific activities.

Sign to be clearly read by a person: at 50 feet (15m) distance

Letter (must be): 6 inches (15 cm) high

Graphics or symbols (must be): at least 15 inches (38cm)

Defensible space: comprises a range of mechanism, real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance that combine to bring the environment under the control of its resident

Rational choice theory: criminal behaviors occurs when an offender decides to break the law or engage in other the undesirable behavior after considering

Rational choice theory (factors): personal, situational and tools needed to commit the crime

Larry suggests (decision to commit crime) is structured: choice of location, target characteristics, the means & techniques available for committing crime

Steps for (preventing repeat victimization): Quickly remove signs of victimization

Improve physical security

Stock easy access to targets

Protect especially vulnerable targets

Regulate access to high risk assets or area

Routine activity theory (suggest): present of capable guardians may deter crime

Criminals generally avoid target or victims: (who are perceived to be armed, capable of coping crime technique)

Situational crime prevention (suggest): to reduce crime opportunities in all (behavioral contexts)

Situation crime prevention (include): reduce crime motives and opportunities, stimulating the conscience of potential offender

SCP (approach): increasing effort, increasing risk, reducing rewards, removing excuses

Second generation CPED helps: to identify (social resources) within the community

Defensible space (four components) Define perceived zones of territorial influence

Provide surveillance opportunities for residents and their guests

Place residential structure close to safe areas

2nd generation CPTED (strategies) Cohesion

Capacity threshold

Community culture

Connectivity

Integrating CPTED during (initial planning): is cost effective

Security Design poses (challenges for architects) Determining requirement

Knowing technology

Understanding architectural implication

(An organized method of access control): is (use of security officer)

(Surveillance Strengthens): access control

Security Planning (should begin): during site selection

The goal is to find a site: that meets (architectural requirements and provides security advantages)

Site (analysis represents): First level of (security defense planning)

Second level of security defense planning: is (perimeter or exterior of the building)

3rd level of security defense planning (for architected): is (internal space protection)

3 Security zone (types): unrestricted, controlled and restricted

Controlled zones: a person must have a valid purpose for entry

Corporate asset (categories): people, information and property

Planting tress that are higher than 3 feet (1m): should not be placed within 10 to 15 feet (3 to 4.5 m) of entrances to prevent hiding spots

Mature trees should be trimmed of low branches: to a height of 8 feet (2.5m)

CPTED theory (prefers): one means of entry and exits for all vehicles at the parking facility

Lighting is gathering area (stairs, elevators, and ramps): 5 to 6 feet candle (54 to 65 lumens per sq meters)

Walking around garages: 5 feet candles

Open parking lot: minimum 3 feet candles

Entrances: 10 feet candles

Light pose height: 30 to 45 feet (9-14m)

Pathways to garages (should lit): 3 feet candles to allow visibility to persons at least 30 feet (9m), with lighting ration 4:1

Parking facilities signage (letter size): 8 inches (20 cm)

General service Administration (GSA) security standards: encourage a defensible space / CPTED approach

GSA (addresses): Security glazing

Bomb resistant design

Planting designs, site lighting

Natural and mechanical surveillance opportunities

For bomb threat (secure perimeter around building): setbacks of 100 feet (30m)

Concrete barriers: 4 feet (1.2m) spacing between them to block vehicular passage

All analog CCTV monitors and cameras employ: 2:1 interlace pattern

Monitor first paints: Odd numbered horizontal sweep lines of the image Re-sweeps the screen with the even numbered horizontal sweep line

Monitor sweep process (combinedly) create: 60 filed (half picture) of information per second in NTSC, 50 fields per second in PAL

In (MTSC) the viewer has sees: (30 complete frame) each second

Digital images are presented (on monitor): a full grid of small squares

Analog video (NTSC or PAL) measured: (in terms of frames)

Digital technology (can adapt quickly): to changing needs

CCTV systems are (meant to be): visual assessment or visual documentation tools

Visual documentation (refers) Visual information stored in a format that allows the study or review of images in a sequential, Various embedded authenticity points, such as time / date stamp or character generation

Sensitivity (refers): to the (minimum amount of visible light that is necessary to produce a quality image)

Resolution (defines): the image quality from a detail or reproduction perspective

The camera (should be chosen): before the lens

Phasing problems are dismissing (due to): Sophistication of controllers, the digital industry

Lenses (determines): what amount and type of image will ultimately appear or the monitor

Lenses (determine): what amount and type of image ultimately appear on the monitor

Subject identification (depends on): size and detail of an image, on the angle of the view

For subject identification (the object should occupy): at least (20%) of the scene’s width

Action identification (captures): what happened

Action identification (require): 10% of the overall scene

Angle of view and three forms of video identification (dictate) : (the placing of cameras and selection of lenses)

If covert camera applications are to be used: the security manager must make sure to respect privacy rights

The choice of camera style (based on): sensitivity, resolution, features, other design factors

Full light cameras: least expensive

(Lower light cameras): middle to high price

Low light cameras: most expensive

Automatic gain control (AGC) designed: to ensure that a camera continued to produce a constituent image as it panned through a shaded area

AGC extremely (useful): when camera swings into an area that is just below minimum light requirement

Electronic shuttering (refers): to camera’s ability to compensate for light changes without the use of automatic or manual iris lenses

Electronic shuttering (utilizations): with electronic shuttering A camera can either work in wide range of light without auto iris lens, Produce high images to capture (fast moving objects)

Auto iris lens: the most common tool for (controlling the brightness of an image) focused onto a chip

For proper security viewing (one should not depend) i.On the camera to view more than two objects

ii.The camera should not auto pan (move side to side)

iii.More tan 45 degree left or right from the center of its major focus

The higher the security risk of the viewing area: the fewer objects each camera should be required to watch

In high security locations: It takes at least (four cameras to view to 360 degree area)

Format size (refers): to the size of the imager area onto which the lens focuses light

The format size of the lens: must match or exceed the format size of the camera

Tunnel vision: if the lens’s format size is too small, the lens will not fill the imager with a picture and the result will resemble tunnel vision

field of view: the height or width of the area being viewed

Field of view (determines): the appropriate focal length for the lens

The more the camera views: the less details it picks up

Coaxial cable is sufficient for analog camera: but doesn’t work for IP based systems

Best to use fiber optic cable: for distance of more than 1,000 feet or more (between camera and the central point)

IP cameras (basic styles): Standard, megapixel and smart

IP cameras measure (their resolution): as (a multiple of the common intermediate format (CIF)

Standard camera range: from one quarter CIF to four times CIF

Mega pixel cameras (range): from 16 to 32 times CIF or higher

Smart camera: because (they take advantages of the their server base and employ computer programs with in computer)

Selection of lens (depends on): size of the scene, degree of visual identification

Lens (types): wide angle, standard, telephone, varifocal, zoom

Standard lens: reproduces a view equivalent to what the human eye sees at the same distance

Wide angle lens: best suited for (short ranges) (15 feet)

Long range is considered: anything over 50 feet

Varifocal lens: is a manual zoom lens, offering the opportunity to tune the view on site

Final size of image (determined by): the focal length of the lens

The field of view is the final size of the viewing area: are measured in width and height

Analog system (creates): (rectangular images)

The resolution of an image (determined) : By camera, by the transmission method, by the weakest link in the video interface, the reproduction capability of the image storage system

The higher the resolution: the sharper the image

SVHS (super VHS): recorders developed: to reduce that loss in color recordings

To create a color image, a camera produces two separate signals : luminance, chrominance

Luminance: is the black and white portion of the signal

Chrominance: is the color part of the signal

DVR (challenge): requires a great deal of storage space

DVR compress video image (using): codec (a compression engine or command sequence)

Popular means of compression is to: record fewer images per seconds

If the application is watching people walk across a lobby: two or three per second may be sufficient

Fences: boundary, control, detection, deter/delay (3 seconds), and forces overt act

Clear zone to structure: 50’ structure to perimeter barrier, and 20’ to parking: 70’

Chain link: most popular; vinyl near sea

7’ (add 1 foot for top guard)

9 gauge wire

2” squares

post distance of 10’

twisted and barbed salvage at top and bottom

fastened to rigid metal or reinforced concrete posts set in concrete

within 2 inches of hard ground

below surface on soft ground to compensate for shifting soil or sand

Standard barbed wire fencing: 7 feet, and 6 inches between strands

Standard barbed wire : twisted double-strand 12 gauge with 4-point barbs

Top-guard supporting arms: permanently affixed, and increase height by 1 foot

Top-guard barbed wire: outward at a 45 (vertical on gate portions), and 3 strands at 6”

Windows > 96 sq. inches: protect if < 18 feet from the ground, <14 feet from trees, etc.

Utilities < 18 feet from the ground: require protection

Security film: 4+ mil polyester applied to interior (increase of 300 X’s)

Tempered glass: safety and security 3-5 times stronger, and 5 times as heat resistant

Illumination of piers, docks, and open decks (and water approach): 1-foot candle

Restricted area lighting: minimum of 0.40-foot candles

Emergency lighting: for power failures within 10 seconds (NFPA 101)

Perimeter signs: <= 100 degree intervals along the perimeter

Monitor watching: <= 10; <= 2 hours

Ultrasonic motion detectors (own-sound sensor; 20 kHz): sound waves; 10’ from air ducts

Lock distance: 40 inches from a window

Key inventories: conducted annually

Combinations: changed annually, compromise, or discharge

Non-insulated security containers: 30-feet drop test

Insulated vault door construction: 6” reinforced

Burglary resistive vaults: 12” walls; doors 6” to 24” (surfaces twice as thick as door)

Security vaults: permanently affixed to the building (interior height 12-feet maximum)

UL classified safes: anchored or weigh at least 750lbs

Document safe: use of liquid and moisture to dissipate heat (350 for paper)

Computer media storage: 150-4 is an acceptable classification

Requirement documents: Major output of the planning phase

Procurement process begins: Security Dept. identifying its needs for new system

3 common methods of procurement: sole source, request for proposal (RFP), invitation for bid (IFB)

Sole source: when the customer has intimate knowledge of the requirements defined and the system available on the market

RFP (most common method): The customer issues an RFP containing functional requirements

Invitation for bids (IFB): Ask vendors to state the cost of materials and installations

IFB (purpose): Obtain the lowest cost for the materials

Request for Invitation (RFI): A standard business process used to collect written information about the capabilities of various integrators

3 ways to streamline the RFP documentation: Provide an outline, provide clear infrastructure and limit the length of each section of RFP

Control of the procurement: Project manager

Bidders conference: Two weeks after RFP issued

1. Bidder’s qualification: a. State contractor license

b. Authorized dealer of the proposed manufacturer for minimum of three years

c. Minimum of five references

d. General liability insurance of at least $2 million

e. Commercial vehicle insurance of at least $1 million

f. Ability to provide a performance bond if requested

Awarding the contract: The last phase in procurement process

Factors to consider when comparing cost: life cycle cost which is the purchase cost plus the operational costs, the maintenance costs, the service interruption costs and the end of life disposal costs.

4 type of testing: Pre delivery or factory acceptance testing, site acceptance testing, reliability or operational availability testing, after implementation testing

Testing (purpose): Equipment performance testing and personnel performance testing

Factory Acceptance Testing (FAT): used when customer does not already have the same system installed in a different location

FAT (verify): system can acceptably handle the maximum number of alarm sensor, device connections, throughput and so on

FAT (prove): System can scale up the level required for the customer’s application

FAT (schedule): before installation

Site Acceptance Test: Start after written approval has been received from the customer, regarding any previous testing activities or installation problems

Site Acceptance Testing (report): Should be received two weeks before the start of the site acceptance testing

SAT (factors): test set up and end user preparation and participation are important factors

Reliability or Operational Availability Testing (OAT): Sometimes called a reliability test, usually conducted over 30 day period

OAT (Purpose): Ensure that the PPS can operate reliably and stably for an extended period

After implementing Testing: Operational test and performance test

After Implement Testing: Post maintenance test, subsystem test, system test, limited scope test, evaluation test

After implement testing: Functional test, safety test, stress test and regression test

Regression test: These test apply to subsystem, systems or procedures that have been altered to perform a new function and must still perform some of their original functions

Project Management: Evolved for the purpose of planning, coordinating, controlling the complex and diverse activities of modern security projects

Project manager: Key to project success

To execute project success: balance scope, time and cost

Successful projects (include): consistent involvement of end users, executive management support, clear understanding of objectives and requirements

Fail to plan: Plan to fail

Project stages: Project feasibility, project development, project execution, project closeout

PPS rule of thumb: Design and engineering: 10-15 percent of total cost

Hardware and software: 15-20 percent of total cost

Installation: 40 – 50 percent of total cost

Training: 3-5 percent of total cost

Contingency: 10 percent of total cost

Project completion: Project is not completed until there is a proof that all objectives have been achieved.

The weakest area in a window is (the sash)

Most resistant to a blast explosion: thick reinforced concrete walls

Street level windows and displays: laminated glass

Glass would be better for a store front in term of resistance to breakage, resistance to heat or extreme cold, and resistance to overall deterioration: acrylic material

Glass often used for safety and security purpose: tempered glass

The most widely used security device: a lock and key device

Locks has been in use the longest and has no security value: warded lock

Lock (cabinet, lockers and safe deposit box): lever lock

Lock for (exterior building door and interior room doors): the pin tumbler lock

The best know performance standard (for guidance on the criteria of effective locking systems): underwriters laboratories

UL standards for the resistance to picking to align tumblers should be at least: 10 minutes

Microwave sensors: (when air tumbler present in the room being protected) + (when there is no potential false alarm sources outside the room)

Acoustic detector: (when light air turbulence) + vibration + motion is present outside the room

Building main entrance/exit doors and perimeter legal exit doors: electromagnetic lock

Inside of stairwell doors: a special hybrid electric locking device known as high tower function mortise

Exterior of stairwell doors where they exit the building: key-operated pin tumbler locks and electromagnetic locks

Elevator lobby or vestibule doors: electromagnetic hold-open devices

Doors leading to tenant spaces: key-operated pin tumbler locks and card access control devices

Doors inside tenant spaces that do not lead to a legal fire exit: key-operated pin tumbler locks, card-operated locks, token-operated locks, biometric identification system operated locks, electrified locking mechanisms, and combination locks

Doors leading to building maintenance areas: key-operated pin tumbler locks, card operated locks, token-operated locks, biometric identification system-operated locks, electrified locking mechanisms, and combination locks

Least expensive (countermeasure): procedural controls

Risk analysis is (key phase): of (requirement analysis)

Risk analysis (leads to): protection requirements

Dynamic risk (carries): both (benefit and cost reduction) both (benefit and cost reduction)

High rise structure (height): (75 – 100 feet) or (23 m – 30 m) or (7 – 10 stories)

(High-rise structure): higher than the maximum reach of available fire fighting equipment

Ability to mitigate threats for H/R structures (depends on) Structural design

The use of technology to deter and detect a threat

To communicate its nature and location

To initiate automatic or organizational response

The most (critical threat in H/R structure): fire, explosion, contamination of life support system

Special attention given in H/R structure: fire

Rigorous vehicle control procedures (can reduce): the possibility of a large quantity of explosion material being transported into an underbidding etc

In H/R structure, primary concern is life safety (unless an emergency is clearly known to be a house): life safety measures must take priority

The first step in (assuring life safety): to comply with local building and fire codes applicable to the structure

Fire detection: Rank as the first priority

Fire codes have long required that: manual fire alarm devices be located on each floor of a multi floor structures in the normal path of exit from an area

Smoke detector generally located: in open areas, space above suspended ceiling, spaces under raised floors, computer room and data center, cafeteria, air duct system, elevator shafts, mechanical equip rooms etc.

Heat detectors (designed): to sense a certain temperature or rapid change in temperature

Heat detectors are (very reliable) and lowest (false alarm rate): of all automatic fire detectors

Heat detectors are best suited for (fire detection): in small confined spaces

A stand pipe system (designed): to transport water vertically to upper floors of the building

Automatic sprinkler system are (essential aspect of fire protection): for high rise structure

When sprinkler are present: the chances of dying in a fire and property loss per fire are cut by one

Standpipe system (can significantly): improve : the efficiency of manual fire fighting operation by eliminating need for long hose

Dry chemical and wet chemical systems (used): for (restaurant hoods, duct, cooking appliance found in kitchen)

CO2 (used): in electrical switchgear rooms, computer and data processing installations

One obvious way (to control smoke): is to limit the use of flammable synthetic materials

Stake effect: vertical natural air movement through the building caused by the differences in temperature and densities between the inside and outside air

The predominant factors that cause smoke movement in tall buildings (are) i.Stake effect

ii.The influence of external wind forces

iii.The force of air movement within the building

Duct (present possibility): of speeding fire, fire gases and smoke throughout the building or area served.

Fire (consists of): Heat, fuel and oxygen

Pyrolysis: Decomposition of solids to the point where they give off enough flammable vapors and gases to form an igniteable mixture

To adequately address the life safety of a high rise structure: it is essential that a comprehensive emergency management plan be created

Open building: access is typically unrestricted at the building entry

(Closed building): access to elevator bank is controlled by some form of credential checking

Property boundary is: first ring

The building: is second ring

The interior space are: the third ring

Building emergency exit strain wells (building strain wells) or fire stains are part of the public access or common areas: must be accessible for occupants to escape

Two factors controls (how building strain wells are secured):

i.One is determined by local fire and building code requirement

ii.Whether inter floor movement of building occupants via the building strain wells is permitted

Installation of a delayed egress locking device that permits, during non emergency times, a 15 to 30 seconds delay in opening the emergency exit fire door from the inside of the strain well at the ground floor exit








Comments

Popular Posts