ASIS CPP "Physical Security " Flashcard help in Exam
ASIS CPP "Physical Security "
Flashcard help in Exam
Best protection available to a company: well-trained/supervised security personnel
Greatest access failure: failure to identify persons. (Waiting room: visiting truck drivers)
Visitors are to be escorted by their counterpart
Security personnel: largest single expense in the security operation
Measurers for improving security: training, improved selection, wages, and lic./reg.
Career (in-house) personnel: inflexible, limited pool of manpower resources
(-) Contract personnel: high turnover
(+) Contract personnel: less expensive, more flexible
Armed guards: justified only where there is danger to life safety
Post orders: the most important written (lowest level) instructions for the guard force.
Value of patrol: observation, reporting, apprehension, and prevention- (least Important).
Guard log: guard’s primary record of significant events.
Guard tours: systematically unsystematic.
Dogs: reduces cost; and, psychological impact (ineffective at gas sites).
Wheel covers or hubcaps: least likely search area.
Upgrading quality of security personnel: most frequently cited recommendation
Training programs for new employees: conducted by security personnel
Training required: for new equipment/processes, change in responsibilities, drop in productivity, or an increase in safety violations/accidents
Training: educational, informative, skill development to impact comprehension or behavior
Security manuals: to be put in the hands of all proprietary and contract security personnel, and others expected to implement security procedures
Supervisory training shortcoming: failure to equip new supervisors with necessary tools
Disturbed persons handling policy: reduce the disturbed person to a form of benevolent
custody,and eliminate the immediate danger
Physical security planning: Deter and delay
Physical security survey: oriented toward the security of property and facilities
Security in depth: placing of progressively more difficult barriers/obstacles
3 lines of defense : property line (outer barrier), building exterior (middle), interior controls
Criticality and vulnerability: determines degree of protection desired in any installation
Vulnerability study: establishing priorities in the protection of assets
Crime prevention surveys: deterrence of criminal activity
Cost-benefit analysis: costs of security operations vs. savings/ reductions
Non cost effective security measures: never to be recommended
Intrusion detection systems sense: interruptions in an electrical circuit or light beam, sound, vibration, or a change in capacitance
Types of security zones: restricted, controlled, and unrestricted
Systems integration of protective measures: primary objective of security system design
4 areas of protection: grounds, building perimeter, building interior, and building contents
MTBF: mean time before failure (basic measure of system reliability)
MTTR: mean time to repair (basic measure of maintainability)
Enunciator: alarm signal board
Dwell time: length of time per image on a sequencer monitor
Microwave system: radio waves are transmitted and partially reflected back
Microwave sensor: based upon the Doppler effect
Microwave motion detectors: not impacted by air turbulence; penetrates non-metal
Capacitance system: electrostatic field around the object to be protected
Ultrasonic (sound wave) sensors: not influenced by exterior noise; reacts to movement and fire-air
Acoustic detectors: not impacted by air turbulence, vibration, or outside motion
Electro-mechanical sensors: current -carrying conductor; foil placed on glass
ESDA: electro-static detection apparatus
Electro mechanical transducers: used to sense alterations in fence fabric
Piezoelectric transducers: uses piezoelectric crystals to convert impacts into electrical signals
Geophone transducers: convert mechanical vibrations into analog electrical signals
Electric cable transducers: sensitized coaxial cable
Balanced magnetic switch: balanced magnet mounted to a door or window frame
Contact switches: magnetic or mechanical switches used on doors and windows
Contact microphone: responds only when the protected object or surface is disturbed
Parabolic microphone: disk attachment used for listening at great distances
Dynamic microphone: small microphone not requiring a power source
Passive infrared (PIR): most widely used device; requires an unobstructed view
Duress alarms: wireless or hard-wired for the protection of people
Hand geometry Identification: based upon the length of fingers and width hand
Biometric systems: fingerprint, retinal, speech, hand geometry, and signature
Biometrics advantages: Personal Identity Verifier (PIV), constant traits, integration
Electromagnetic locks: no moving parts
Pin tumbler lock: most common interior/exterior lock
Wafer lock: generally used in automobiles, desks and cabinets
Warded lock: oldest mechanical lock with least value
Tumbler code potential: total numbers raised by the number of tumblers
Fail-safe locks: open when power fails (allows people to get safe)
Fail-secure locks: lock when power fails (vault)
Multiplexing: transmission of several simultaneous messages on the same medium
Time division multiplexing (TDM): events one at a time over a shorter distance
Frequency division multiplexing (FDM): simultaneous, multi-channel, longer distance
Pen register: provides records of all calls dialed from a particular phone
Safes and vaults: neither provide both fire and burglary protection
Safe attack: drilling, manipulation, and peeling
TRTL: torches and tools
Burning bar: produces a large volume of smoke.
Relock: automatically stops the bolt mechanism from operating upon attack
Delay: Depends greatly on adversary’s tools and techniques
Penetration efforts begins: 2 ft (.6 m) in front of the barrier and ends 2 ft. (.6m) beyond it
Barrier penetration time depends: hand tools, powered tools, abrasive water jets, thermal cutting tools, vehicles
Compartmentalization: the use of barriers to segregates and physically protect valuable materials or information
A clear zone of 20 ft: should separate a perimeter barrier from exterior structures, parking areas and natural features
A clear zone of 50 feet: Should separate a perimeter barrier from structures within the protected area
Barriers (commonly utilized): accident, by force, by stealth
Less than 18 feet above the ground or 96 square inches or larger: invite penetration
First line of defense: located at outer edge of property
Second line of defense: walls, ceilings, roof and floors of building themselves
Third line of defense: Interim areas
Perimeter protection: first line of defense
Perimeter barrier: prevents/impedes aggressor from crossing a perimeter boundary
Strong room: interior room constructed of solid materials (i.e., a safe for people)
Fencing (4): chain link, concertina, barbed wire, and barbed tape
Glass: weakest area within a window
Laminated glass: street-level windows or displays; intervening layer of plastic material
Spalling: small pieces without sharp edges (Auto Glass)
Illuminating Engineering Society: all lighting must be in compliance with this organization
Protective lighting purposes: psychological, object illumination, and physical deterrent
Continuous lighting: overlapping cones of light; down and away; small areas
Lighting considerations: floodlights, searchlights, streetlights, and fresnel lenses
Outdoor security lighting: continuous, standby, movable, and emergency
Lumens: light output
Luminance: intensity of light
Florescent lighting: good color; temperature sensitive (low temperature/low efficiency)
Incandescent: good color; low cost/efficiency; short life (house lamp)
Gaseous discharge lamps: mercury vapor (soft blue: street lights); sodium vapor (soft yellow: fog)
Metal halide: same as mercury vapor
Quartz lamps: instant start; very bright light excellent for perimeter barriers
Perimeter fence lighting: located within the protected area, and above the fence
Protective lighting: object illumination, psychological, and physical deterrent
Glare method: light glares into the eyes of a potential intruder
Reinforced concrete walls: most resistant to explosion blast
Expanded metal for (security barrier construction)
Expanded metal: discourage (break in attempts)
Glazing (refers): installation of transparent glass or plastic in construction
Glass (types): sheet, plate and float
Glass Primarily (manufacture) to resist (wind pressure and breakage)
Tampered glass (treated): to resist breakage (safety and security purpose)
Use (T/glass): passage ways, entrance doors, adjacent panels
Wired glass: resistance to (impact of longer objects) with risk of injury
W/glass (used): installation (interior and exterior), required by (fire and safety code)
Laminated glass: highly shatter distant
L/glass (useful): areas (vulnerable to explosions)
L/glass (installation): street level windows / displays, door ways
Laminated security glass: protect (smash and grab attack)
L/security glass: (5/16 inch thick) interlayer (high resistance plastic)
acrylic material (plexiglass): less than half weight of glass
plastic glazing (categories): acrylic and polycarbonic
Polycarbonate sheets: weight 50 – 60 percent less than glass
Polycarbonate (used): in laminated glass
Bullet resistance (BR) glass: laminated provide (ballistic resistance)
Security lighting (purpose): psychological deterrent to intrusion
Lumens: output or quality of light emitted
100 watts (household bulb): output (1700 lumens)
Illuminance: concentration of light over a particular area
Illuminance (measured): in lux
one foot candle = 10.76 lux (ration about 1:10)
Lux: number of lumens per square meter or foot candles
To perceive a scene: evaluate (amount of light or its illuminance)
Reflectance: see an object when light reflected from that object
For silhouette: no reflection required to see
Object illuminated (other than white light): see object (colors)
Color of surface has (impact): on reflectance
Parking lot (paved in concrete): higher reflectance
Parking lot (paved in asphalt or black top): less reflectance
Reflectance (measurement): ratio (quality of lumens felling and reflected)
CRI : ability of a lamp reproduce the colors seen in an object
CRI important in CCTV display: apprehension and prosecution of criminals
CRI (70 to 80) Good
CRI (above 80): excellent
CRI (100%) daylight
Corrected color temperature (CCT): a measure (warmth or coolness of light)
CCT has (impact): on (mood and ambiance of surroundings)
Lighting system (compound): lamp, luminaries, mounting hardware, electrical power
Lamp (include): filament, its glass casing, its electrical connectors
luminaries (fixture): lamps, holder, reflectors and diffusers
Diffusers (used): to distribute and focus light
Mounting hardware (used): to fix (luminaries at correct height and location)
Technology (sensitive to reduced voltage): high intensity discharge (H/D)
3 Lamps (HID) family: mercury vapor, metal halide, high pressure sodium
Lamp (types): incandescent, halogen and quartz halogen, fluorescent, mercury vapor, metal halide, high pressure sodium, low pressure sodium
Incandescent: at residence, most expensive to operate, least efficient
Incandescent 100%: excellent (CRI), short life time
Halogen and quartz halogen: incandescent with 25% better efficiency and life
Fluorescent (used): outdoors (except for signs)
CRI 80% above (excellent): incandescent, halogen and q/halogen, fluorescent
CRI 70-80% good: mercury vapor lamps
Mercury vapor lamps: CRI heavy on blue (pass electricity through gas)
Metal halide: gaseous, imitate daylight, colen naturals (100%)
Metal halide (used): sports stadiums
most expensive light to install and maintain: metal halide
metal halide (with CCTV): CRI (excellent)
Lamps (gaseous): metal halide, h/pressure sodium, pressure sodium
CRI (poor): high pressure sodium lamps
High pressure sodium (used): on street and parking lots and in fog conditions
High pressure sodium (allows): to see more detail at greater
High pressure sodium (make): things / yellow
High pressure sodium: very long life and energy efficient
Low pressure sodium lamps: make (color unrecognizable)
Low pressure sodium (produce): a yellow gray color
H/D lamps (require): starting and re striking time
H/D lamp require (starting / R-striking time): because (they rely on arc to produce light)
Lighting acts as: deterrent to unauthorized intrusion
Design solution perimeter lighting (consider): regarding (light trespass)
building façade (illumination): floodlighting (provide high contrast)
Higher light source (provide): horizontal illumination
Lighting consideration (rule of thumb): for pedestrians or normal cameras for detection (0.5 fc), recognition (1.0 fc), identification (2.0 fc)
Identification verification / access control (types): guards, card reader, systems, biometric readers
guards (make): A personal recognition (through judgment)
card reader: compare the coded card with the computer records
biometric readers: use of a person’s physical property
large access control system (include): operator’s terminals
L/A control (function) Admit or reject cards for entry
Alarm (if an unauthorized entry or exact attempt is made)
Alarm when penetration is made without using a card
Make a permanent transaction record
Print real time events and historical logs
Modern card system should (embody): validity, reliability, ease of use, tamper resistant, longevity
Reliability: system must correctly identify an individual each time
Card readers (must popular): read magnetic coding
Coded cards (types): magnetic stripe, watermark magnetic, barium ferrite, weigend and proximity
Magnetic stripe cards: readers sense the magnetic energy present in or absent from (a minute field)
Card (difficult to defeat): watermark magnetic cards
Card (vulnerability to sabotage): barium ferrite
Weigend card: more secure than magnetic stripe cards more secure than magnetic stripe cards
Card (not effected by magnetic field): weigend
Proximity card (compatible): people who have disabilities
Card (types): resonant circuits, radio frequency readers, biometric, Hollerith, smart card resonant circuits, radio frequency readers, biometric, Hollerith, smart card
Resonant circuits (use): electronic surveillance of merchandise and stock control
Radio frequency readers: long range proximity reader
R/F readers (application): electronic article surveillance
R/F readers (push bottom transmitter): lock / unlocks car
Biometric (utilize): unique physical data about the person
Smart cards: (personal indemnification device)
Smart cards (contain): all information need to identify (in its chip memory)
Anti pass back feature (use): for large business compiler (has a high value work)
Employees authorized to enter (high value are): where door has anti pass back feature
Basic ingredients (alarm system): Sensors
Intrusion detectors (divided): (perimeter or point of entry), (general area), and object
Sensors (designed to): initiate alarms
Outdoor sensors (temperature range): - 30 OF to 150 OF
Most widely used (intrusion detectors): PIR
PIR’s (detect object): either warmer or cooler against (background temperature)
PIR function (based on): temperature variations
Temperature (for winter country) PIR (detect): warmer object (room cooler)
Warmer climate (PIR detect): cooler object (room hotter)
PIR (see): invisible, bold colors of thermal infrared (IR)
Key to (design and installation): avoiding source of false alarms
PIR (use): indoor
Pyro electric sensor: Produces an electrical output when subjected to a change in IR energy
Primary consideration (avoid false alarm): proper installation
PIR (mounted location): intruder pass (across its field of view)
For PIR (common sources of false alarms): drafts and insets
Air (from vents or drafts): should not flow (directly on the unit)
For PIR (direct sunlight): cause false alarms
Avoid PIR (mounting): where it see (a bright window or direct sunlight)
Glass breaks sensors: Largely (replaced foil):
Breaking glass produce (sound wave frequencies): 3 to 5 KHz
B/glass produce (seismic shock frequencies): 200 Hz
Acoustic sensors (capable sense): Acoustic and seismic frequency ranges
Less susceptible to (false alarms): due to (simultaneously listen and feel)
Acoustic Glass breaks sensors (installed): on walls or ceilings
A/G break sensors (best detection): installed or a wall (opposite protected glass)
Glass / B shock sensors (feel): wave generated by breaking glass
G/B shock sensors (installer attached): directly to a protected pane
G/B sensors (appropriate choice): for protecting glass (in loud, occupied rooms where acoustic sensors prone to false alarms)
MM/Switches (protected): accessible openings (such as doors, windows and sky lights)
MM/switches (installed): on (protected or secure side)
MM/switches (two part): one installed (opening surface) another fixed surface
Ultrasonic Sensors (based on): Doppler effect (h/frequency sound wave)
Microwaves or sound waves are (disturbed): (when movement changes signal frequency between Tx/Rx)
Alarm (initiated): when a distortion of the wave pattern caused by movement
Ultrasonic/S (not influenced): by exterior audio noise
Ultrasonic/S (reacts only): to movement (within a protected area)
Will not cause alarm: movement beyond (walks of protected area)
U/S (cause false alarm): Air Current, such as those from (air conditioning)
U/S sensor (usually limited): to indoor application (where types of movements are less varied)
As with a PIR, an U/S detector (detect): a lock in or concealed intruder (by that person’s movement)
U/S sensor (doesn’t alarm): if cabinets or container placed flush against a wall
Microwave sensors (principle): based on (Doppler effect)
Microwave sensors (utilize): high frequency electromagnetic energy
M/sensor (not affected): by (heavy fog, rain, snow, sleet, air, turbulence, drafts, noise, temperature, entrances or atmospheric disturbances
M/sensors (application): both (indoor and outdoor)
M/sensor (used): for (area protection) by wave patter (flood)
M/Sensor (used): for (perimeter protection) by narrow beam
Microwave (disturbed): if a movement, the waveform changes
microwave beam (can be blocked) or diverted: by (metal objects)
Microwave can (penetrate): nonmetallic construction material (plaster walls)
microwave (can detect): movement outside (non metallic objects)
Capacitance sensors: Large electric condenser (radiate energy)
C/sensors (detects): change in the (capacitive coupling)
C/sensors (connected): directly to an object (to be protected)
C/sensors (generally use): to protect ( a safe or file cabinet)
C/sensors (cause alarms): when intruder (who touches the object) because it disturb the circuit
PIR (can detect): intruder: long before (intruder reaches a protected object)
Capacitance sensors now (replaced by): PIR sensors
C/Sensors still (preferred protection): if critical to limit the field of detection (just to the protected object)
Shock and vibration sensors (application): object protection
Shock and vibration sensors: same technology (glass break shock sensors)
S/V sensors (detect): vibrations caused by intruder (attempt to penetrate wall)
Alarm discriminator (used): so that vibration / outside the protected space or surface) is disregarded
P/electric sensors (principle): based on (modification of a light level or interruption of a light beam)
Infrared filter (used): so only invisible light is transmitted
Light source or receiver strength: need amplified: distance longer than 500 to 1000 feet
To counteract (circumventing device): receiver frequented
Stages of fire: incipient stage, smoldering stage, flame stage, heat stage.
Incipient stage: invisible combination, no visible (smoke, flame or heat)
Smoldering stage: visible (combustion as a smoke) heat / flame (not present)
Flame stage: flame (exist), not yet appreciable heat
Heat stage: uncontrolled heat, rapidly expanding air
Fire sensors (type): thermal (heat), smoke (photo electric), flame (ultraviolet), product of combustion (ionization), fusible element device, water flow indicators
Thermal sensor (type): fixed temperature, rate of risk
Fixed temperature responds: on predetermined temperature
Rate of rise (respond): to (increase in heat) at a rate (greater than predetermined value
Smoke sensor (activate): an alarm (when obscuration) due to (smoke accumulation in the air)
Flame detectors (activate): alarm (when spectral field reached the predetermined color, in ultraviolet range)
Product of combustion (responds): to (early change in ionization) (electric change in the air)
Fusible element device (involve): frangible material or those with very low melting temperature
Water flow indicators (installed): in sprinkler system risers
W/F indicator (activate alarm): when water flows in the system
A major task for AP professional / addressing: relevant concerns (when considering a communications application)
Every communication S/professional (concerned): with (integrity of medium, integrity of message, timeliness of Tx, message security)
Message (security) accessibility of the communication to authorized person only
Integrity of (message): complete errorless transmission of data
Alarm signal (transmitted): on unshielded pair of (DC conductors)
Size and resistance of wire (must considered): Resistance varies directly with length of line Inversely with diameter of wire
Wire resistance (limits): effective (length of a line)
Audio signals (transmitted): on shielded twisted pair of (AC types wires)
Audio signals and audio transmission both (may be transmitted): on shield twisted pairs of (AC types wires) / refer voice grade lines
Alarm signals and audio transmission both (may be transmitted): on shield twisted pairs of (AC types wire refer voice grade line
Optical fiber (transmit): larger volumes of information (at speed of light
Optical fiber (used): to carry voice grade signals, video signals, digital on grade, digital on date grade signals
Optical fiber (not affected) by: electromagnetic interference (EMI) or radio frequency interference (RFI)
Optical fiber: Do not carry (electric current), do not (radiate signals)
O/F (carry): more different multiplexed message
O/F: must small and lighter than (conventional wires)
O/F: flexible and can take (an irregular course from point to point)
O/F (not vulnerable): to interception by (acoustic or inductive coupling)
Video Signals cannot be (transmitted): directly on DC lines
V/Signals (cable transmitted): on (coaxial and optical fiber) cable or (on standard telephone line) or (on balanced twisted wire pairs)
For coaxial cable transmission (doesn’t require further processing): if transmission distance short (typically 1,000 feet)
Real time transmission (possible): if transmission path is via optical fiber and telephone signal in digital format
Transmission installations (types): loop, point to point, multiplex
Three types (may be used): with (proprietary wire network or leased telephone line)
In a loop system (devices installed): on a pair of wires
Signal at control center (indicate) when (abnormal situation occur on the loop)
Loop system (adequate for): a small space or a single facility
Better method of transmission (in loop system): is to code the signal from each detector (so that source of each signal can be defined at the central point)
Short circuit or broken connection on the loop (can be partially corrected): by using a McCulloh circuit.
Point to point installation is connected: directly to a control center by a pair of wires
Point to point installation (more expensive though loop system): because more wire is required
With loop system (all detectors in an area could be disabled): by interrupting the loop at the proper location
Multiplexing (is a technique): to transmit several message simultaneously (on the same medium)
Multiplexing (transmission medium): can be (wire, radio frequency, microwave / OF)
Multiplex installation (cost effective) than (loop or point to point) installation
Multiplex installation (cost effective) because (a multiple signals are transmitted over long distance to a control center)
Multiplexing (two methods): Time Division Multiplexing (TMD), Frequency Division M (FDM)
With TDM, each sensor or data source is assigned a time segment
With TDM, each sensor (can transmit): only during its assigned segment
In FDM, signals from a number of sensors (on a common transmission line): occupy (defined portions of the frequency spectrum)
Even though transmitted simultaneously: their different frequencies keep them (individually identifiable at the receiver)
To protect communications: 1. Outside wiring should be installed (underground)
2. Inside wiring should be installed (in conduits)
A wire alarm system (should be designed) with line supervision to check the circuits automatically and immediately signal line faults
Simplest (line supervision) is: a end of line resistor
End of line resistor (introduce): a constant, measurable electrical current
Line supervision (detects): Open circuit (broken connection), aground (wire or wire short)
Any unscrambled or unencrypted communication transmitted by wireless technology (considered): available for interception
Microwave and laser technologies (rely on): line of sight
Microwave (can penetrate): main, fog and snow
Microwave (is not affected): by man made noise
Proper signal reception (depends): on the ability of the equipment (to discriminate wanted signals) from unwanted signals and noise
Interference (common cause): signal from other transmitter, and atmospheric industrial) noise
Security Survey: Critical on-site examination to ascertain the present security status, identify deficiencies or excess, determine the protection needed
Reason for: Proper security is worth spending some money to obtain
Can be termed as: risk analysis & risk assessment
Cost benefit analysis: Direct comparison of the investment for security and reduction of losses
2 steps of traditional building planning process: programming, schematic design
Drawings: Cornerstone of any constructions project
Floor plan (scottish plan): shows a top down plan
Elevations (views of vertical surfaces): to show mounting heights and locations of wall mounted devices
Risers: representation of complete sub systems
Risk assessment techniques: determine the types of loss or risk, estimate the Probability of Occurrence, quantifying the loss occurrence
Risk analysis: is process of identifying asset values, threats and vulnerabilities to ascertain risks
Risk analysis (goal): Risk mitigation option
Risk: Potential for loss or damage
Risk (based on): Likelihood of threats or hazards
Risk assessment (provides): Risk profile
No security program should be implemented: without identifying the assets of the company trying to protect
Security Risk = Asset value rating x Threat likelihood rating x Severity of incident rating x vulnerability rating
Risk management: Determining measures and safeguards to mitigate the threats and reduce vulnerabilities including cost benefit analysis
Threat: the intention to cause damage
Hazard: is a source of potential danger
Loss event profile: list of the kinds of threats affecting the assets to be safeguarded
3 distinct category of threats or loss event: crimes, non criminal events, consequential events
Assessing severity: prevention, control & recovery
Frequency estimation: Keys to risk measurement
Vulnerability: Any weakness that can be exploited by an aggressor
Vulnerability assessment (requires): Asset and threat pair
Risk mitigation (options): Risk assumption, risk avoidance, risk limitations, risk transference and site hardening
Cost benefit analysis: final state of conducting a security risk analysis
Probability: Is a mathematical value which is never greater than 1
Frequency: number of time an event could happen
Likelihood: How likely an event is to happen
Criticality: the value of an asset
Lost income: determine the amount of lost interest
Cost avoidance: the approach used by risk management in determining how much risk an enterprise retains and how much it insures
Pure risk: Events which are loss only oriented
Professional vulnerability assessment involves: analysis of the procedure, identify the weakness, lack of control over information
Threat logic pattern: Countermeasures planning indicate that although several problems have been separately stated a single countermeasures may neutralize them.
Function of PPS: Detection, delay & response
Detection: most effective at the target
Detection: is not complete without assessment
Deter: Purpose to make the target unattractive to the potential adversaries
Deny: access of any unauthorized person will be denied
Detection: How quick a system is to detect an illicit entry (most important for PS)
Delay: once detected, placing various obstacles to delay before response
Protection in depth: to accomplish the goal, an adversary should be required to avoid or defeat a number of protective devices in sequence
Corrective measures: reduce the effect of an attack by allowing a rapid and effective response
Design elements: Architectural aspects, security systems, and operational factors
Design criteria: Identify the characteristics that the security system will have in terms of performance and operational factors
Output of design: Bid Package or construction documents
Bid package: Bidder’s instruction, specification, drawing and schedules
Form of specification: General, products and the execution
Budgetary estimates: Prepared during the initial planning phase
Life cycle cost estimates (include): engineering and design, hardware, software, installation, operation, maintenance, miscellaneous, service interruption, end of life
CPTED design to (reduce): crime opportunity and fear of crime through (natural), (mechanical) and (procedural means)
CPTED best applied (using): a multidisciplinary approach
CPTED is (based on): common sense and a heightened awareness (about how people) use their space (for legitimate and criminal intentions)
The rising importance of CPTED: in (design and planning process)
CPTED is best of management tools (targeting): place, behavior, design & use of space
CPTED congruent with security mission: of deterring, detecting, delaying
CPTED (addresses): (the design of physical space)
Design of physical space (support): the legitimate and intended users of the space, minimize predictable behavior of offenders,
CPTED solutions (through): mechanical, human & organizational and natural measures
Natural measure (provide): specific guidance for the use of space
Natural measure (include): natural access of control, natural surveillance, natural territorial reinforcement
CPTED (additional solutions): management and maintenance, legitimate activity
Broken Windows theory: leaving broken windows or other decay markers unattended or unprepared can lead to the impression of abandonment and increase crime opportunity as no capable guardian is observed
To be effective (CPTED) program must engage: Stakeholders, especially residents, (in identifying CPTED strategies for specific places) that are defined, designated, and designed (known as 3D concept) for specific activities.
Sign to be clearly read by a person: at 50 feet (15m) distance
Letter (must be): 6 inches (15 cm) high
Graphics or symbols (must be): at least 15 inches (38cm)
Defensible space: comprises a range of mechanism, real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance that combine to bring the environment under the control of its resident
Rational choice theory: criminal behaviors occurs when an offender decides to break the law or engage in other the undesirable behavior after considering
Rational choice theory (factors): personal, situational and tools needed to commit the crime
Larry suggests (decision to commit crime) is structured: choice of location, target characteristics, the means & techniques available for committing crime
Steps for (preventing repeat victimization): Quickly remove signs of victimization
Improve physical security
Stock easy access to targets
Protect especially vulnerable targets
Regulate access to high risk assets or area
Routine activity theory (suggest): present of capable guardians may deter crime
Criminals generally avoid target or victims: (who are perceived to be armed, capable of coping crime technique)
Situational crime prevention (suggest): to reduce crime opportunities in all (behavioral contexts)
Situation crime prevention (include): reduce crime motives and opportunities, stimulating the conscience of potential offender
SCP (approach): increasing effort, increasing risk, reducing rewards, removing excuses
Second generation CPED helps: to identify (social resources) within the community
Defensible space (four components) Define perceived zones of territorial influence
Provide surveillance opportunities for residents and their guests
Place residential structure close to safe areas
2nd generation CPTED (strategies) Cohesion
Capacity threshold
Community culture
Connectivity
Integrating CPTED during (initial planning): is cost effective
Security Design poses (challenges for architects) Determining requirement
Knowing technology
Understanding architectural implication
(An organized method of access control): is (use of security officer)
(Surveillance Strengthens): access control
Security Planning (should begin): during site selection
The goal is to find a site: that meets (architectural requirements and provides security advantages)
Site (analysis represents): First level of (security defense planning)
Second level of security defense planning: is (perimeter or exterior of the building)
3rd level of security defense planning (for architected): is (internal space protection)
3 Security zone (types): unrestricted, controlled and restricted
Controlled zones: a person must have a valid purpose for entry
Corporate asset (categories): people, information and property
Planting tress that are higher than 3 feet (1m): should not be placed within 10 to 15 feet (3 to 4.5 m) of entrances to prevent hiding spots
Mature trees should be trimmed of low branches: to a height of 8 feet (2.5m)
CPTED theory (prefers): one means of entry and exits for all vehicles at the parking facility
Lighting is gathering area (stairs, elevators, and ramps): 5 to 6 feet candle (54 to 65 lumens per sq meters)
Walking around garages: 5 feet candles
Open parking lot: minimum 3 feet candles
Entrances: 10 feet candles
Light pose height: 30 to 45 feet (9-14m)
Pathways to garages (should lit): 3 feet candles to allow visibility to persons at least 30 feet (9m), with lighting ration 4:1
Parking facilities signage (letter size): 8 inches (20 cm)
General service Administration (GSA) security standards: encourage a defensible space / CPTED approach
GSA (addresses): Security glazing
Bomb resistant design
Planting designs, site lighting
Natural and mechanical surveillance opportunities
For bomb threat (secure perimeter around building): setbacks of 100 feet (30m)
Concrete barriers: 4 feet (1.2m) spacing between them to block vehicular passage
All analog CCTV monitors and cameras employ: 2:1 interlace pattern
Monitor first paints: Odd numbered horizontal sweep lines of the image Re-sweeps the screen with the even numbered horizontal sweep line
Monitor sweep process (combinedly) create: 60 filed (half picture) of information per second in NTSC, 50 fields per second in PAL
In (MTSC) the viewer has sees: (30 complete frame) each second
Digital images are presented (on monitor): a full grid of small squares
Analog video (NTSC or PAL) measured: (in terms of frames)
Digital technology (can adapt quickly): to changing needs
CCTV systems are (meant to be): visual assessment or visual documentation tools
Visual documentation (refers) Visual information stored in a format that allows the study or review of images in a sequential, Various embedded authenticity points, such as time / date stamp or character generation
Sensitivity (refers): to the (minimum amount of visible light that is necessary to produce a quality image)
Resolution (defines): the image quality from a detail or reproduction perspective
The camera (should be chosen): before the lens
Phasing problems are dismissing (due to): Sophistication of controllers, the digital industry
Lenses (determines): what amount and type of image will ultimately appear or the monitor
Lenses (determine): what amount and type of image ultimately appear on the monitor
Subject identification (depends on): size and detail of an image, on the angle of the view
For subject identification (the object should occupy): at least (20%) of the scene’s width
Action identification (captures): what happened
Action identification (require): 10% of the overall scene
Angle of view and three forms of video identification (dictate) : (the placing of cameras and selection of lenses)
If covert camera applications are to be used: the security manager must make sure to respect privacy rights
The choice of camera style (based on): sensitivity, resolution, features, other design factors
Full light cameras: least expensive
(Lower light cameras): middle to high price
Low light cameras: most expensive
Automatic gain control (AGC) designed: to ensure that a camera continued to produce a constituent image as it panned through a shaded area
AGC extremely (useful): when camera swings into an area that is just below minimum light requirement
Electronic shuttering (refers): to camera’s ability to compensate for light changes without the use of automatic or manual iris lenses
Electronic shuttering (utilizations): with electronic shuttering A camera can either work in wide range of light without auto iris lens, Produce high images to capture (fast moving objects)
Auto iris lens: the most common tool for (controlling the brightness of an image) focused onto a chip
For proper security viewing (one should not depend) i.On the camera to view more than two objects
ii.The camera should not auto pan (move side to side)
iii.More tan 45 degree left or right from the center of its major focus
The higher the security risk of the viewing area: the fewer objects each camera should be required to watch
In high security locations: It takes at least (four cameras to view to 360 degree area)
Format size (refers): to the size of the imager area onto which the lens focuses light
The format size of the lens: must match or exceed the format size of the camera
Tunnel vision: if the lens’s format size is too small, the lens will not fill the imager with a picture and the result will resemble tunnel vision
field of view: the height or width of the area being viewed
Field of view (determines): the appropriate focal length for the lens
The more the camera views: the less details it picks up
Coaxial cable is sufficient for analog camera: but doesn’t work for IP based systems
Best to use fiber optic cable: for distance of more than 1,000 feet or more (between camera and the central point)
IP cameras (basic styles): Standard, megapixel and smart
IP cameras measure (their resolution): as (a multiple of the common intermediate format (CIF)
Standard camera range: from one quarter CIF to four times CIF
Mega pixel cameras (range): from 16 to 32 times CIF or higher
Smart camera: because (they take advantages of the their server base and employ computer programs with in computer)
Selection of lens (depends on): size of the scene, degree of visual identification
Lens (types): wide angle, standard, telephone, varifocal, zoom
Standard lens: reproduces a view equivalent to what the human eye sees at the same distance
Wide angle lens: best suited for (short ranges) (15 feet)
Long range is considered: anything over 50 feet
Varifocal lens: is a manual zoom lens, offering the opportunity to tune the view on site
Final size of image (determined by): the focal length of the lens
The field of view is the final size of the viewing area: are measured in width and height
Analog system (creates): (rectangular images)
The resolution of an image (determined) : By camera, by the transmission method, by the weakest link in the video interface, the reproduction capability of the image storage system
The higher the resolution: the sharper the image
SVHS (super VHS): recorders developed: to reduce that loss in color recordings
To create a color image, a camera produces two separate signals : luminance, chrominance
Luminance: is the black and white portion of the signal
Chrominance: is the color part of the signal
DVR (challenge): requires a great deal of storage space
DVR compress video image (using): codec (a compression engine or command sequence)
Popular means of compression is to: record fewer images per seconds
If the application is watching people walk across a lobby: two or three per second may be sufficient
Fences: boundary, control, detection, deter/delay (3 seconds), and forces overt act
Clear zone to structure: 50’ structure to perimeter barrier, and 20’ to parking: 70’
Chain link: most popular; vinyl near sea
7’ (add 1 foot for top guard)
9 gauge wire
2” squares
post distance of 10’
twisted and barbed salvage at top and bottom
fastened to rigid metal or reinforced concrete posts set in concrete
within 2 inches of hard ground
below surface on soft ground to compensate for shifting soil or sand
Standard barbed wire fencing: 7 feet, and 6 inches between strands
Standard barbed wire : twisted double-strand 12 gauge with 4-point barbs
Top-guard supporting arms: permanently affixed, and increase height by 1 foot
Top-guard barbed wire: outward at a 45 (vertical on gate portions), and 3 strands at 6”
Windows > 96 sq. inches: protect if < 18 feet from the ground, <14 feet from trees, etc.
Utilities < 18 feet from the ground: require protection
Security film: 4+ mil polyester applied to interior (increase of 300 X’s)
Tempered glass: safety and security 3-5 times stronger, and 5 times as heat resistant
Illumination of piers, docks, and open decks (and water approach): 1-foot candle
Restricted area lighting: minimum of 0.40-foot candles
Emergency lighting: for power failures within 10 seconds (NFPA 101)
Perimeter signs: <= 100 degree intervals along the perimeter
Monitor watching: <= 10; <= 2 hours
Ultrasonic motion detectors (own-sound sensor; 20 kHz): sound waves; 10’ from air ducts
Lock distance: 40 inches from a window
Key inventories: conducted annually
Combinations: changed annually, compromise, or discharge
Non-insulated security containers: 30-feet drop test
Insulated vault door construction: 6” reinforced
Burglary resistive vaults: 12” walls; doors 6” to 24” (surfaces twice as thick as door)
Security vaults: permanently affixed to the building (interior height 12-feet maximum)
UL classified safes: anchored or weigh at least 750lbs
Document safe: use of liquid and moisture to dissipate heat (350 for paper)
Computer media storage: 150-4 is an acceptable classification
Requirement documents: Major output of the planning phase
Procurement process begins: Security Dept. identifying its needs for new system
3 common methods of procurement: sole source, request for proposal (RFP), invitation for bid (IFB)
Sole source: when the customer has intimate knowledge of the requirements defined and the system available on the market
RFP (most common method): The customer issues an RFP containing functional requirements
Invitation for bids (IFB): Ask vendors to state the cost of materials and installations
IFB (purpose): Obtain the lowest cost for the materials
Request for Invitation (RFI): A standard business process used to collect written information about the capabilities of various integrators
3 ways to streamline the RFP documentation: Provide an outline, provide clear infrastructure and limit the length of each section of RFP
Control of the procurement: Project manager
Bidders conference: Two weeks after RFP issued
1. Bidder’s qualification: a. State contractor license
b. Authorized dealer of the proposed manufacturer for minimum of three years
c. Minimum of five references
d. General liability insurance of at least $2 million
e. Commercial vehicle insurance of at least $1 million
f. Ability to provide a performance bond if requested
Awarding the contract: The last phase in procurement process
Factors to consider when comparing cost: life cycle cost which is the purchase cost plus the operational costs, the maintenance costs, the service interruption costs and the end of life disposal costs.
4 type of testing: Pre delivery or factory acceptance testing, site acceptance testing, reliability or operational availability testing, after implementation testing
Testing (purpose): Equipment performance testing and personnel performance testing
Factory Acceptance Testing (FAT): used when customer does not already have the same system installed in a different location
FAT (verify): system can acceptably handle the maximum number of alarm sensor, device connections, throughput and so on
FAT (prove): System can scale up the level required for the customer’s application
FAT (schedule): before installation
Site Acceptance Test: Start after written approval has been received from the customer, regarding any previous testing activities or installation problems
Site Acceptance Testing (report): Should be received two weeks before the start of the site acceptance testing
SAT (factors): test set up and end user preparation and participation are important factors
Reliability or Operational Availability Testing (OAT): Sometimes called a reliability test, usually conducted over 30 day period
OAT (Purpose): Ensure that the PPS can operate reliably and stably for an extended period
After implementing Testing: Operational test and performance test
After Implement Testing: Post maintenance test, subsystem test, system test, limited scope test, evaluation test
After implement testing: Functional test, safety test, stress test and regression test
Regression test: These test apply to subsystem, systems or procedures that have been altered to perform a new function and must still perform some of their original functions
Project Management: Evolved for the purpose of planning, coordinating, controlling the complex and diverse activities of modern security projects
Project manager: Key to project success
To execute project success: balance scope, time and cost
Successful projects (include): consistent involvement of end users, executive management support, clear understanding of objectives and requirements
Fail to plan: Plan to fail
Project stages: Project feasibility, project development, project execution, project closeout
PPS rule of thumb: Design and engineering: 10-15 percent of total cost
Hardware and software: 15-20 percent of total cost
Installation: 40 – 50 percent of total cost
Training: 3-5 percent of total cost
Contingency: 10 percent of total cost
Project completion: Project is not completed until there is a proof that all objectives have been achieved.
The weakest area in a window is (the sash)
Most resistant to a blast explosion: thick reinforced concrete walls
Street level windows and displays: laminated glass
Glass would be better for a store front in term of resistance to breakage, resistance to heat or extreme cold, and resistance to overall deterioration: acrylic material
Glass often used for safety and security purpose: tempered glass
The most widely used security device: a lock and key device
Locks has been in use the longest and has no security value: warded lock
Lock (cabinet, lockers and safe deposit box): lever lock
Lock for (exterior building door and interior room doors): the pin tumbler lock
The best know performance standard (for guidance on the criteria of effective locking systems): underwriters laboratories
UL standards for the resistance to picking to align tumblers should be at least: 10 minutes
Microwave sensors: (when air tumbler present in the room being protected) + (when there is no potential false alarm sources outside the room)
Acoustic detector: (when light air turbulence) + vibration + motion is present outside the room
Building main entrance/exit doors and perimeter legal exit doors: electromagnetic lock
Inside of stairwell doors: a special hybrid electric locking device known as high tower function mortise
Exterior of stairwell doors where they exit the building: key-operated pin tumbler locks and electromagnetic locks
Elevator lobby or vestibule doors: electromagnetic hold-open devices
Doors leading to tenant spaces: key-operated pin tumbler locks and card access control devices
Doors inside tenant spaces that do not lead to a legal fire exit: key-operated pin tumbler locks, card-operated locks, token-operated locks, biometric identification system operated locks, electrified locking mechanisms, and combination locks
Doors leading to building maintenance areas: key-operated pin tumbler locks, card operated locks, token-operated locks, biometric identification system-operated locks, electrified locking mechanisms, and combination locks
Least expensive (countermeasure): procedural controls
Risk analysis is (key phase): of (requirement analysis)
Risk analysis (leads to): protection requirements
Dynamic risk (carries): both (benefit and cost reduction) both (benefit and cost reduction)
High rise structure (height): (75 – 100 feet) or (23 m – 30 m) or (7 – 10 stories)
(High-rise structure): higher than the maximum reach of available fire fighting equipment
Ability to mitigate threats for H/R structures (depends on) Structural design
The use of technology to deter and detect a threat
To communicate its nature and location
To initiate automatic or organizational response
The most (critical threat in H/R structure): fire, explosion, contamination of life support system
Special attention given in H/R structure: fire
Rigorous vehicle control procedures (can reduce): the possibility of a large quantity of explosion material being transported into an underbidding etc
In H/R structure, primary concern is life safety (unless an emergency is clearly known to be a house): life safety measures must take priority
The first step in (assuring life safety): to comply with local building and fire codes applicable to the structure
Fire detection: Rank as the first priority
Fire codes have long required that: manual fire alarm devices be located on each floor of a multi floor structures in the normal path of exit from an area
Smoke detector generally located: in open areas, space above suspended ceiling, spaces under raised floors, computer room and data center, cafeteria, air duct system, elevator shafts, mechanical equip rooms etc.
Heat detectors (designed): to sense a certain temperature or rapid change in temperature
Heat detectors are (very reliable) and lowest (false alarm rate): of all automatic fire detectors
Heat detectors are best suited for (fire detection): in small confined spaces
A stand pipe system (designed): to transport water vertically to upper floors of the building
Automatic sprinkler system are (essential aspect of fire protection): for high rise structure
When sprinkler are present: the chances of dying in a fire and property loss per fire are cut by one
Standpipe system (can significantly): improve : the efficiency of manual fire fighting operation by eliminating need for long hose
Dry chemical and wet chemical systems (used): for (restaurant hoods, duct, cooking appliance found in kitchen)
CO2 (used): in electrical switchgear rooms, computer and data processing installations
One obvious way (to control smoke): is to limit the use of flammable synthetic materials
Stake effect: vertical natural air movement through the building caused by the differences in temperature and densities between the inside and outside air
The predominant factors that cause smoke movement in tall buildings (are) i.Stake effect
ii.The influence of external wind forces
iii.The force of air movement within the building
Duct (present possibility): of speeding fire, fire gases and smoke throughout the building or area served.
Fire (consists of): Heat, fuel and oxygen
Pyrolysis: Decomposition of solids to the point where they give off enough flammable vapors and gases to form an igniteable mixture
To adequately address the life safety of a high rise structure: it is essential that a comprehensive emergency management plan be created
Open building: access is typically unrestricted at the building entry
(Closed building): access to elevator bank is controlled by some form of credential checking
Property boundary is: first ring
The building: is second ring
The interior space are: the third ring
Building emergency exit strain wells (building strain wells) or fire stains are part of the public access or common areas: must be accessible for occupants to escape
Two factors controls (how building strain wells are secured):
i.One is determined by local fire and building code requirement
ii.Whether inter floor movement of building occupants via the building strain wells is permitted
Installation of a delayed egress locking device that permits, during non emergency times, a 15 to 30 seconds delay in opening the emergency exit fire door from the inside of the strain well at the ground floor exit


Comments
Post a Comment