• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/154

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

154 Cards in this Set

  • Front
  • Back

Most CPTED practitioners prefer_____________lamps because they last about ________ hours and accurately reproduce the color of cars, clothes, and people.

Physical Security Domain (25%)



Different light sources produce different qualities of light. Most CPTED (pronounced sep-ted) practitioners prefer metal halide lamps because they last about 20,000 hours and accurately reproduce the color of cars, clothes, and people.


Ref: POA Physical Security Pg 71.

One footcandle is equal to ______ lux.

Physical Security (25%)



One footcandle is equal to 10.76 lux (often approximated to a ratio of 1:10).


Ref: POA Physical Security Pg 169.

The quantity of light emitted by a lamp is measured in ________.

Physical Security (25%)



The quantity of light emitted by a lamp is measured in lumens.


Ref: POA Physical Security Pg 169.

It is strongly recommended that the position of _______________ report to a key _______ -level executive of the organization...

It is strongly recommended that the position of Chief Security Officer (CSO) report to a key senior-level executive of the organization...


Chief Security Officer - An Organizational Model Standard Pg 2 #4.

Three financial reports or statements have become accepted as a standard: ____________,


_________, and ____________.

Business Principles and Practices (11%)



Financial Statements


Three (3) financial reports or statements have become accepted as standard: the income statement, balance sheet, and statement of cash flows. Through these statements it is possible to paint a clear picture of a company's current and prospective financial health.


Ref: POA Security Management Page 15, 2.2


Memorize this!


The standard measure for explosive comparison is _____________.

Crisis Management (8%)



The standard measure for explosive comparison


is TNT (trinitrotoluene), which has a VoD of 6,900 meters (22,600ft.) per second.


VoD = velocity of detonation.


Ref: POA Crisis Management Pg 88, 3.13.1

_____________ is the concentration of light over a particular area.

Physical Security (25%)



Illuminance is the concentration of light over a particular area.


Ref: POA Physical Security Pg 169.

Illuminance is measured in _______, representing the number of lumens per square meter or in foot-candles (fc), the number of lumens per square foot.

Physical Security (25%)



Illuminance is measured in lux, representing the number of lumens per square meter or in foot-candles (fc), the number of lumens per square foot.


Ref: POA Physical Security Pg 169.

Corrected color temperature (CCT) is a measure of the ________ or __________ of a light.

Physical Security (25%)



Corrected color temperature (CCT) is a measure of the warmth or coolness of a light. It is measured in degrees Kelvin.


Ref: POA Physical Security Pg 172.

_____________ vapor lamps typically last about _________ hours and are the most energy-efficient,


but their poor _____________ makes them unsatisfactory for capturing crime scene details.


Physical Security (25%)



Low-pressure sodium vapor lamps typically last about 50,000 hours and are the most energy-efficient, but their poor color rendition makes them unsatisfactory for capturing crime scene details.


Ref: POA Physical Security Pg 71.

_____________vapor lamps and __________ vapor lamps are less expensive than ____________ lamps but do not last as long and do not render colors as well.

Physical Security (25%)



High-pressure sodium vapor lamps and mercury vapor lamps are less expensive than metal halide lamps but do not last as long and do not render colors as well.



There is no one right answer for all facilities. The CPTED approach allows diversity in lighting, based on risk and threat assessment and desired user experience.


Ref: POA Physical Security Pg 71.

Explosions may be __________, ___________, or


_____________.

Crisis Management (8%)



Explosions may be mechanical, chemical, or nuclear.


Ref: POA Crisis Management P87, 3.13.1


Memorize this!

________ is best applied using a _____________ approach that engages planners, designers, architects, landscapers, law enforcement, security professionals and facility users in working teams.

Physical Security (25%)



CPTED (pronounced sep-ted) is best applied using a multidisciplinary approach that engages planners, designers, architects, landscapers, law enforcement, security professionals and facility users (residents, employees, etc.) in working teams.


Ref: POA Physical Security Pg 37.

The ability of a lamp to faithfully reproduce the colors seen in an object is known as ___________.

Physical Security (25%)



The ability of a lamp to faithfully reproduce the colors seen in an object is known as color rendition and is measured as a color rendition index (CRI) on a scale of 0 to 100. A CRI of 70 to 80 is considered good, above 80 is considered excellent, and 100 percent is considered daylight.


Ref: POA Physical Security Pg 173.

____________ and _____________ and ____________ vapor light sources have very low CRI values and should not be used in conjunction with color camera applications or where color identification is critical.

Physical Security (25%)



High- and low-pressure sodium and mercury vapor light sources have very low CRI values and should not be used in conjunction with color camera applications or where color identification is critical.


Ref: POA Physical Security Pg 173.

The restrike time in minutes for a __________ lamp is instant.


Physical Security (25%)



The restrike time in minutes for a incandescent lamp is instant.


Ref: POA Physical Security Pg 178, Figure 6-6 Lamp Starting and Restrike Times.


Memorize this!

A general rule for lighting levels is _____fc for detection, _____fc for recognition, and _____ fc for identification.

Physical Security (25%)



A general rule for lighting levels is 0.5 fc for detection, 1.0 fc for recognition, and 2.0 fc for identification.


Ref: POA Physical Security Pg 179.

Physical security uses ________, ________, and ________ to protect assets.

Physical Security (25%)



Physical security uses people, procedures, and technology (both hardware and software) to protect assets.


Ref: POA Physical Security Pg 1.


The primary functions of a physical protection system (PPS) are ________, _________, and ____________.


A secondary function is _____________.

Physical Security (25%)



The primary functions of a physical protection system (PPS) are detection, delay, and response; a secondary function is deterrence.


Ref: POA Physical Security Pg 1.


Memorize this!

A _________ is a collection of products, processes, or both, combined to provide a solution to a problem or goal.

Physical Security (25%)



A system is a collection of products, processes, or both, combined to provide a solution to a problem or goal.


Ref: POA Physical Security Pg 5.

______________ is the combination of a variety of components to form a system.

Physical Security (25%)



Integration is the combination of a variety of components (such as people, procedures, and technology) to form a system. Integration includes both electrical integration as well as functional integration.


Ref: POA Physical Security Pg 5&6.

_______________ is that part of security concerned with physical measures designed to safeguard people; to prevent unauthorized access to equipment, facilities, material, and documents; and to safeguard them against a security incident.


Physical Security (25%)



Physical security is that part of security concerned with physical measures designed to safeguard people; to prevent unauthorized access to equipment, facilities, material, and documents; and to safeguard them against a security incident.


Ref: POA Physical Security Pg 1.

A _____________ is a logical method for problem solving in which a comprehensive solution is developed in relation to a problem having several dimensions. A type of systems approach follows three general steps: _______________, _______________, and ________________.

Physical Security (25%)



A systems approach is a logical method for problem solving in which a comprehensive solution is developed in relation to a problem having several dimensions. A type of systems approach follows three general steps: assessment of vulnerability, implementation of countermeasures, and evaluation of effectiveness.


Ref: POA Physical Security Pg 6.

_____________ means that to accomplish the goal, an adversary should be required to avoid or defeat a number of protective devices in sequence.

Physical Security (25%)



Protection-in-depth means that to accomplish the goal, an adversary should be required to avoid or defeat a number of protective devices in sequence.


Ref: POA Physical Security Pg 31.

_______________ is the kind of threats or risks affecting the assets.

Loss event profile is the kind of threats or risks affecting the assets.


Important!

__________________ is the chance of those threats becoming actual loss events.

Loss event probability is the chance of those threats becoming actual loss events.

_________________ is the effect on assets or business if the loss occurs.

Loss event criticality is the effect on assets or business if the loss occurs.

________ is the design or redesign of a venue to reduce crime opportunity and fear of crime through _________, ___________, and __________


means.

Physical Security (25%)



CPTED is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means. CPTED is a crime prevention theory grounded in environmental criminology...


Ref: POA Physical Security Pg 37.


Important!

Typical lighting levels are _____ fc for walkways, ___ - ___ fc for roadways, ____ fc for entrances and _____ fc for open yards.

Physical Security (25%)



Typical lighting levels are 1-4 fc for walkways, 0.5-2 fc for roadways, 10 fc for entrances and 2 fc for open yards.


Ref: POA Physical Security Pg 179.

A ____________ lock is one that will remain locked when power is lost or another failure occurs.

Physical Security (25%)



A fail secure lock is one that will remain locked when power is lost or another failure occurs.


Ref: POA Physical Security Pg 245.

A __________ locking mechanism is one that will unlock under any failure condition.

Physical Security (25%)



A fail safe locking mechanism is one that will unlock under any failure condition.


Ref: POA Physical Security Pg 245.

The _____________ sensor, a proximity sensor, is a large electrical condenser that radiates energy and detects change in the capacitance coupling between an antenna and the ground. In a typical installation, a _____________ sensor wire is connected to an object to be protected, such as a ______ or a file cabinet.

Physical Security (25%)



The capacitance sensor, a proximity sensor, is a large electrical condenser that radiates energy and detects change in the capacitance coupling between an antenna and the ground. In a typical installation, a capacitance sensor wire is connected to an object to be protected, such as a safe or a file cabinet.


Ref: POA Physical Security Pg 125.


Yes!!

UL standards require that a safe weighing less than ________ lb. be anchored.

Physical Security (25%)



UL standards require that a safe weighing less than 750 lb. (340kg) be anchored.


UL = Underwriters Laboratories Inc.


Ref: POA Physical Security Pg 276.


Absolutely!!!

__________________ is the term for a four-pronged process used by the emergency management community throughout the United States.

Crisis Management (8%)



Emergency Management is the term for a four-pronged process used by the emergency management community throughout the United States.


Ref: POA Crisis Management Pg 6.

The four elements of emergency management are __________, __________, __________,and __________.

Crisis Management (8%)



The four elements of emergency management are mitigation, preparedness, response, and recovery.


Ref: POA Crisis Management Pg 6&7


Note: Proceed to the reference and read each definition.


YES!!! mprr

When an organization chooses to terminate an employee of concern, it should engage in strategies designated to ensure _____________,


_____________, and _______ termination.

Personnel Security (12%)



When an organization chooses to terminate an employee of concern, it should engage in strategies designed to ensure thoughtful, respectful and safe termination.


Note: Proceed to the reference to review each strategy a-f.


Ref: Workplace Violence Prevention and Intervention Standard Pg 31&32 8.6.1.2

_____________ are the most important written instructions for the security force.

Post orders are the most important written instructions for the security force.


Ref: POA Security Officer Operations Pg 34&35.

Post orders should be developed with the following criteria in mind:


-each order deals with a ________ subject


-each order is as ________ as possible


-each order is written in ________, easy-to-understand terms


-orders are _________ in detail

Post orders should be developed with the following criteria in mind:


-each order deals with a single subject


-each order is as brief as possible


-each order is written in simple, easy-to-understand terms


-orders are indexed in detail


Ref: POA Security Officer Operations Pg 34&35.

Re: Executive Protection - assassinations. Attackers and those who made near-lethal approaches described having a combination of motives. Eight specific motives were identified:


_______________ ______________


_______________ ______________


_______________ ______________


_______________ ______________

Personnel Security (12%)


Executive Protection (EP) Assassination



Attackers and those who made near-lethal approaches described having a combination of motives. Eight specific motives were identified:


-to achieve notoriety or fame


-bring attention to a personal or public problem


-avenge a perceived wrong


-end personal pain


-be removed from society, or be killed


-save the country or the world


-develop a special relationship with the target


-make money


-bring about political change


Ref: POA Security Management Pg 269.

The EP specialist (EPS) should develop a particular mindset that focuses on ____________ and _________ trouble rather than combating it. Six principles can guide one's thinking about EP:


_______________________


_______________________


_______________________


_______________________


_______________________


_______________________

Personnel Security (12%)



The EP specialist (EPS) should develop a particular mindset that focuses on preventing and avoiding trouble rather than combating it. The following six principles can guide one's thinking about EP (Oatman, 1997):


-prevent and avoid danger


-realize that anyone can protect anyone


-don't stop to think


-keep clients out of trouble


-understand the security vs. convenience continuum


-rely on brains,not technology


Ref: POA Security Management Pg 271.

The ____________ sheet summarizes an organization's investing and financing. The report's underlying equation is as follows:



_________ = __________ + _________________


Business Principles and Practices (11%)


Financial Management



The balance sheet summarizes an organization's investing and financing. The report's underlying equation is as follows:



assets = liabilities + shareholder equity


Ref: POA Security Management Pg 17.


!!!

A high-rise structure is considered between ______ feet and ______ feet, or approximately ____ - _____ stories.

Generally, a high-rise structure is considered to be one that extends higher than the maximum reach of available fire-fighting equipment. In absolute numbers, this has been set variously between 75 feet (23 meters) and 100 feet (30 meters), or approximately 7-10 stories (depending on the slab-to-slab height between floors).


Ref: POA Applications Pg 51.


****

The _____________ Act of ______ prohibits discrimination, failure or refusal to hire, discharge, limitation, segregation, or classification in any way adverse to an employee or employment applicant on the basis of race, color, religion, sex, or national origin.

Legal Aspects ( 7%)



The Civil Rights Act of 1964 prohibits discrimination, failure or refusal to hire, discharge, limitation, segregation, or classification in any way adverse to an employee or employment applicant on the basis of race, color, religion, sex, or national origin. Originally applicable to businesses and not the government itself, it was amended in 1972 and 1991 to apply to any employer with 15 or more employees whose business affects interstate commerce, to the federal government, and to state and local governments.


Ref: POA Legal Issues Pg 133.


The Civil Rights Act of 1991 modified some rights and limited the amount a jury could award.

Federal statutory law is contained in the 50 titles of the United States Code (U.S.C.). Title ______ deals with criminal and criminal procedure.

Legal Aspects (7%)



Federal statutory law is contained in the 50 titles of the United States Code (U.S.C.). Title 18 deals with crime and criminal procedure. The remaining titles are primarily civil...


Ref: POA Legal Issues Pg 117.

A ______ is a willful or negligent wrong done to one person by another.

Legal Aspects (7%)



A tort is a willful or negligent wrong done to one person by another.


Ref: POA Legal Issues Pg 129

_________ Theory ____ and ____ holds that two worker models can be contrasted. Theory ____ contends that workers are inherently lazy and tend to avoid work. Theory ____ states workers are naturally motivated and want to work hard.

Behavioral Theories


Douglas McGregor's Theory X and Theory Y holds that two worker models can be contrasted. Theory X contends that workers are inherently lazy and tend to avoid work. They lack creative ambition, must be goaded, require constant supervision, and are motivated by fear. Theory Y states workers are naturally motivated and want to work hard and do a good job.


Refs: POA Sec. Mgmt. Pg 90 & Sec. Officer Ops. Pg 47, 48 & 49. Also read Maslow, Herzberg, Argyris, and Bennis!!!

_______________ studied the relationship between particular design features and crime in public housing developments in New York....He modified housing developments by implementing elements of ________ design: high fences; designated paths, etc.

Physical Security (25%)


Defensible Space Theory



Oscar Newman studied the relationship between particular design features and crime in public housing developments in New York... He modified housing developments by implementing elements of CPTED design: high fences; designated paths, etc.


Ref: POA Physical Security Pg 50.


Need to know!!


Five attributes characterize an effective and reliable investigation: ___________, ___________, ____________, and ____________.

Investigations (10%)



Five attributes characterize an effective and reliable investigation: objectivity, thoroughness, relevance, accuracy, and timeliness.


Ref: POA Investigation Pg 2.


Note: The investigative process is both science and art. The art manifests itself in these important qualities. It is managements role to ensure these qualities are present at both the strategic level and on an individual case basis.


OTRAT


Very important!

A commonly accepted definition of an ______________ is a systematic and thorough examination or inquiry into something or someone and the recording of that examination in a report.

Investigations (10%)



A commonly accepted definition of an investigation is a systematic and thorough examination or inquiry into something or someone and the recording of that examination in a report.


POA Investigation Pg 1. The word investigate can be traced to the Latin word investigare, meaning "to search into".


Another definition from PCI materials - An investigation is a logical collection of information through inquiry and examination for the purpose of developing evidence leading to problem resolution. Also, an investigation is a fact-finding activity that involves searching, collecting data, and studying information in order to respond to an inquiry or problem. The process is focused so that a hypothesis or conclusion can be drawn or information learned.

The _____________ sensor operates on generally the same principle as the ultrasonic sensor. It uses a higher-frequency electromagnetic energy. A transmitter sends a signal that is reflected back to an antenna. When the signal is reflected from a moving object, the wave form changes and initiates an alarm. They may be used in indoor and outdoor applications, because they are generally not affected by weather, noise, etc. The beam may be blocked or diverted by metal objects.

Physical Security (25%)



microwave

__________ = imprisonment of more than one year.


__________ = imprisonment of one year or less.

Legal Aspects (7%)



Felony = imprisonment of more than one year.


Misdemeanor = imprisonment of one year or less.

A ____________ is usually defined by two parallel fences extending the entire length of the perimeter. It provides a view of the barrier and adjacent terrain.

Physical Security (25%)



A clear zone is usually defined by two parallel fences extending the entire length of the perimeter. Clear zones provide a view of the barrier and adjacent terrain.

A clear zone of _____ feet or more should separate a perimeter from exterior structures, parking areas, and natural features. A clear zone of _____ feet or more should separate a perimeter barrier from structures within the protected area, except when a building wall constitutes part of the barrier.

Physical Security (25%)



A clear zone of 20 feet or more should separate a perimeter from exterior structures, parking areas, and natural features. A clear zone of 50 feet or more should separate a perimeter barrier from structures within the protected area, except when a building wall constitutes part of the barrier.

Managing investigations entail basic tactics of management. List the five functions:


_______________________________________________


_______________________________________________

Investigations (10%)



Managing investigations entail basic tactics of management: planning, organizing, directing, coordinating, and controlling. All five of these functions apply at each level of investigative management: the strategic level, the operational level, and the case level.


Ref: POA Investigation Pg 10 1.3 Review>>Fig. 1-1


Also, review Pg 14 Fig 1-2 Investigative Services-Outsourcing Versas Internal

The value of private sector investigative capabilities id frequently measured in terms of __________, __________, and ____________.

Investigations (10%)



The value of private sector investigative capabilities is frequently measured in terms of recovery, restitution and risk reduction.


Ref: POA Investigation Pg 7.


Yes!

In investigations, it is important to:


-open an investigation ________


-complete an investigation _________, and


-avoid closing an investigation ______________.

Investigations (10%)



In investigations, it is important to:


-open an investigation asap,


-complete an investigation as quickly as possible, and


-avoid closing an investigation prematurely.


Ref: POA Investigation Pg 6.


Important!

The main objective of any investigation is to attempt to answer six basic questions:


_____________________________________________.

Investigation (10%)



The main objective of any investigation is to attempt to answer six basic questions:


NEOTWY


When, where, who, what, how, and why

The three main tools of an investigation are often called the 3I's:


1._______________


2._______________


3._______________

The three main tools of an investigation are often called the 3I's:


1. Information


2. Interrogation


3. Instrumentation


Remember this!

____________ Amendment: provides against unreasonable searches and seizures.

Fourth Amendment: provides against unreasonable searches and seizures.

____________ Amendment: provides the right to be free from self-incrimination...

Fifth Amendment: provides the right to be free from self-incrimination.

Successful workplace undercover investigations unfold in five distinct phases:


____________________________________________________________________________________________________

Successful workplace undercover investigations unfold in five distinct phases:


planning and preparation, information gathering, verification and analysis, disciplinary and corrective action, and prevention and education.

The primary purpose of a private sector security organization is to protect the interests of the ______________________.

The primary purpose of a private sector security organization is to protect the interests of the employing enterprise.

Interview and Interrogation



A ___________ subject responds to questions with complicated, detailed explanations that include factual information that is overly broad for the questions.

A deceptive subject responds to questions with complicated, detailed explanations that include factual information that is overly broad for the questions. A deceptive person also gives delayed, evasive, or vague answers.

A ___________ person not only responds directly to questions, but also speaks clearly,and may make general, sweeping denials.

A truthful person not only responds directly to questions, but may make general, sweeping denials.

The primary function of the security officer is? Choose the one most correct answer:


a. fire prevention


b. security


c. prevent theft


d. access control


e. life safety


f. guard


g. eyes and ears

The primary function of the security officer is access control.


Ref: POA Security Operations Pg 4.


ACCESS CONTROL!!

An opening less than ____ feet above the ground or ____ square inches or larger invite penetration into a building and must be addressed.

Building Openings


Any opening less than 18 feet above the ground or 96 square inches or larger invite penetration and must be addressed.

Chain link fencing _________ posts should be equally spaced not exceeding ____ feet.

Chain Link Fencing


Line posts should be spaced at equal distances not exceeding 10 feet.


The extended re-lighting time is typical of ___________ lamps.

The extended re-lighting time is typical of high-intensity discharge (HID) lamps.

Magnetic media will deteriorate at ______ degrees F or higher and with humidity levels of more than ____ %.

Magnetic media will deteriorate at 150 degrees F or higher and with humidity levels of more than 80%.

The Pin Tumbler Lock consists of at least three elements:


____________ ___________ ___________.

The Pin Tumbler Lock consists of at least three elements:


1. Pin


2. Driver or separate metal cylinder


3. Spring

There are five basic types of countermeasures:


______________________________________________________________________________________________________

There are five types of countermeasures:


-policies and procedures


-personnel


-barriers


-equipment and records

Barrier Types: ______________________________________________________________________________________________________

Barrier Types:


-Natural


-Structural


-Human


-Animal


-Compartmentation

Intrusion detectors can be divided into three classes:


______________________________________________________________________________________________________

Alarm Sensors


Intrusion detectors can be divided into three classes:


-Perimeter or point of entry


-General area


-Object


Memorize this!!!


__________________ sensors are the most widely used intrusion detectors.

Passive Infared Sensors (PIRs) are the most widely used intrusion detectors. PIRs see thermal or infared (IR) energy. Because they emit no energy, they are called passive.

______________ detectors initiate an alarm upon simultaneous activation of two alarm technologies working in concert.

Dual technology such as PIR/microwave detectors initiate an alarm upon simultaneous activation of two alarm technologies working in concert.


Read carefully!

_____________ sensors can be affected by extremes of snow or heavy fog.

Photoelectric sensors can be affected by extremes of snow or heavy fog.

Three types of line transmission installations are commonly used in electronic protection systems:


-


-


-

Three types of line transmission installations are commonly used in electronic protection sytems:


-loop


-point-to-point


-multiplex


Read these topics!

_____________ transmits several messages simultaneously on the same medium.

Multiplexing transmits several messages simultaneously on the same medium.

The three key elements in the theft/fraud triangle are _____________, ______________, and __________________.

The three key elements in the theft/fraud triangle are opportunity, motivation, and rationalization.


MOR!!!!!!


You better remember this!

Trade Secret must meet the following conditions:

Trade Secret must meet the following conditions:


-it is identified by group or type


-it is not available in public sources


-it is disclosed only to persons with a duty to protect it


-persons must know it is a secret


-owner must show effort to protect it


The most serious internal threat to a trade secret is an employee.

A _________ for an invention is granted by the US Patent and Trademark Office. The term is generally ____ years.

A patent for an invention is granted by the US Patent and Trademark Office. The term is generally 20 years.

________ is the right to literary (or written) property as recognized by laws.

Copyright is the right to literary (or written) property as recognized by laws.

_______________ are distinctive mark of authenticity, through which a product is identified...

Trademark and service marks are distinctive mark of authenticity, through which a product is identified...

There are five primary ways in which work can be divided:

There are five ways in which work can be divided:


-purpose


-process or method


-clientele


-time


-geotraphy


____________states there is a limit to the number of subordinates who can be effectively be supervised by one person.

Span of Control states there is a limit to the number of subordinates who can effectively be supervised by one person.

_____________ states that a person should have one immediate supervisor to report to. An exception is an emergency.

Unity of Command states that a person should have one immediate supervisor to report to. An exception is an emergency.

_____________ states a person is motivated by a hierarchy of values. The primary is survival and physical/physiological safety, and at the top is the need for self-actualization.

Maslow's Hierarchy states a person is motivated by a hierarchy of values. The primary is survival and physical/physiological safety, and at the top is the need for self-actualization. Abraham H. Maslow names the following human needs:


-physiological or survival needs, such as food, drink, and health


-safety or physical and emotional needs, such as clothing, shelter, and protection against attack


-affection needs, such as belonging to a family or other small group


-esteem needs, such as self-respect, accomplishment, and achievement recognized and appreciated by someone else


-self-fulfillment needs, that is, being able to use one's potential to the maximum in working with and for one's fellow beings


Maslow theorizes that once the primary needs are satisfied, they are no longer driving needs and are replaced by needs higher in the order,


The __________________ is the basic instrument for determining security vulnerability.It identifies people, things, or processes that are necessary to the continuation of the business.

The security survey is the basic instrument for determining security vulnerability. The survey identifies people, things, or processes that are necessary to the continuation of the business. It is the on-site examination analysis designed to :


-determine existing security measures


-identify deficiencies


-establish the protection needed, and


-recommend measures to enhance overall security

The ________ post on chain link fencing is placed at the ends, corners, and also used to support gates.

The terminal post on chain link fencing is placed at the ends, corners, and also used to support gates.


Basics!

Locks can be divided into two general classes:


_______________


_______________

Locks can be divided into two general classes:


-mechanical


-electrical and combine electrical energy with mechanical operations.


!!

_____________ sensors use a high frequency sound wave and are based on the Doppler Effect. When the sensor detects a distortion of the wave pattern caused by movement, an alarm is initiated. This sensor is limited to indoor application.

Ultrasonic sensors use a high frequency sound wave and are based on the Doppler Effect. When the sensor detects a distortion of wave pattern caused by movement, an alarm is initiated. This sensor is limited to indoor application.

Preventing a bomb from entering a site may be acheived through ___________and _____________ of visitors and goods, including mail.

One of the many principles of bomb security is: Preventing a bomb from entering the site. This may be achieved through access controls and screening of visitors and goods, including mail.


Access controls and screening!!!!

Incident Command System (ICS) normally consists of five primary elements:


______________________________________________________________________________________________________

Incident Command System (ICS) normally consists of five primary elements:


-command


-operations


-planning


-logistics


-finance and administration


Several special staff positions, including public affairs, safety and liason, report directly to the incident commander (IC) when the emergency warrants establishment of those positions.

The __________________________ prohibits discrimination against a person ____ years of age or older.

The Age Discrimination Employment Act (ADEA) of 1967 prohibits discrimination against a person 40 years of age or older.

________________ is a way to monitor connection lines between a sensor and the alarm control center.

Line Supervision is a way to monitor connection lines between a sensor and the alarm control center.

A wire alarm system should be designed with _____________ to check the circuits automatically and immediately signal line defaults.

A wire alarm system should be designed with line supervision to check the circuits automatically and immediately signal line defaults.

_________________ means to protect connections. Outside wiring should be installed underground (connection should not be from the nearest pole) and inside wiring should be installed in conduit.

Line protection means to protect connections. Outside wiring should be installed underground (connection should not be from the nearest pole) and inside wiring should be installed in conduit.

The ________________ Rule describes when an employee reasonably believes that an interview may lead to or result in disciplinary action and requests that a union representative be present, the union rep must be allowed.

The Weingarten Rule: When an employee reasonably believes that an interview may lead to or result in disciplinary action and requests that a union representative be present, the union rep must be allowed.

In 2006, among adults 18 or older, the rate of drug use was ________ for unemployed persons vs employed or part-time.

In 2006, among adults age 18 or older, the rate of drug use was higher for unemployed persons (18.5%) than for those who were employed full time (8.8%) or part-time (9.4%). In 2006, there were about 17.9 million illicit drug users age 18 or older.

The ____________________ is a wide-ranging civil rights law that prohibits discrimination based on a qualified disability.

The Americans with Disabilities Act (ADA) - 1990 is a wide-ranging civil rights law that prohibits discrimination based on a qualified disability. Regulations cover all employers with 15 or more employees in industry affecting commerce

_____________ is a necessary part of risk management.

Risk assessment is a necessary part of risk management, it is the process of defining how big the risk is. Risk assessment techniques may be heuristic (adhoc), inductive, or deductive. Some methods are quantitative, others are qualitative. Quantitative approach requires measurable data, and qualitative techniques are often based on subjective matters.

When an entire population is at risk, it is called a __________________.

When an entire population is at risk, it is called a societal risk.

In general, there are three classifications of CPTED strategies:


___________________________________________________________________________________________________

In general, there are three classifications of CPTED strategies:


-Mechanical measures


-Organizational measures


-Natural or Architectural measures

The emergency planning three-prong approach includes:


____________________________________________________________________________________________

The emergency planning three-prong approach includes:


-Mitigate


-minimize


-recover


mmr*****


As in other security disciplines, information systems can be divided into three broad classifications:


___________________________________

As in other security disciplines, information security can be divided into three broad categories:


-administrative controls


-technical controls


-physical controls

The notion of the CIA triad clarifies the type of issues relevant in information security.CIA=


_____________________________

Information's confidentiality, integrity, and availability. (CIA)


CIA!!!

Written ______ agreements ensure common understanding and legal obligation regarding the protection of information assets.

Written nondisclosure (NDAs) agreements ensure common understanding and legal obligation regarding the protection of information assets.

The goals of an emergency plan include:


______________________________________

The goals of an emergency plan include:


-protection of life


-protection of property


-restore normal opertions

__________________ requires executive officers and chief financial officers to personally certify financial reports that are released to the public.

Sarbanes-Oxley Act (SOX) requires executive officers and chief financial officers to personally certify financial reports that are released to the public.

Tree canopies should be trimmed up to ___ feet in height where appropriate to provide a clear line of site and reduce hiding spots and ambush opportunities.

Tree canopies should be trimmed up to 8 feet in height where appropriate to provide a clear line of site and reduce hiding spots and ambush opportunities.

When handling a spent bullet cartridge it is recommended that it is picked up by the open end using ________________ so as not to destroy any partial prints or other evidence that may be on the outside of the cartridge.

When handling a spent bullet cartridge it is recommended that it is picked up by the open end using tweezers or some other tool so as not to destroy any partial prints or other evidence that may be on the outside of the cartridge.

The decision on whether to arm an officer should be based on the existence of one or both of the following conditions:


_____________________________


_____________________________

The decision on whether to arm an officer should be based on the existence of one or both of the following conditions:


-There is a great danger to life safety without the weapon


-The officer may reasonably be expected to use fatal force


Critical!

The best way to reduce theft is to hire employees with ________________.

The best way to reduce theft is to hire employees with integrity.

The _________________ is the basic starting point for pre-employment screening.

The employment application is the basic starting point for pre-employment screening.

_______________ should be used in potential hiding places or area of illegitimate activity or along walls containing windows from which people should be kept away.

Spiny or thorny shrubs should be used in potential hiding places or area of illegitimate activity or along walls containing windows from which people should be kept away.

A well engineered PPS exhibits the following characteristics:


______________________


______________________


______________________

A well engineered PPS exhibits the following characteristics:


-protection-in-depth


-minimum consequence of component faillure


-balanced protection

______________________ is:


-private-sector version of comprehensive emergency management (CEM)


-all action taken by businesses before, during, or after an emergency. Includes business impact analysis (BIA).

Business Continuity (BC).


Low-growing plants should be set back ___ yard(s) from the edge of paths or walkways.

1 yard.

The principle of _______________ require that doors and their associated frames, hinges, bolts, and locks be strengthened to provide the same delay as that provided by the floors, walls, and ceilings of the parent structure.

Balanced design.

In developing an organizational strategy you should ask what are the ________________________________________________

Strengths, weaknesses, opportunities and threats involved in the business venture (SWOT).

Guidelines recommend that unarmed private security officers should be at least ____ years old.

18.

Guidelines recommend that armed private security officers should be at least ____ years old.

21.

Armed private security officers must comply with the Lautenberg amendment which forbids__________________

Anyone convicted of domestic violence (felony or misdemeanor) from possessing a firearm. US Public Law 104-208 Section 658 (known as the Lautenberg amendment). Note: Also read Sec Off Ops POA Page 9 re: convictions and pleas!!

Regarding information security, one of the most overlooked threats are _______________.

Re: info. sec. - one of the most overlooked threats are inadvertent threats. This can be attributed to inadequate employee training, misunderstandings, lax security enforcement, etc.

______________ refers to the physical equipment used to control the movement of people or material in the area.

Entry control.

____________ refers to the process of managing databases or other records used to determine the parameters of authorized entry.

Access control.

Private sector investigative capabilities is frequently measured in terms of __________________________________.

Recovery, restitution, and risk reduction.

In criminal court the prosecutor must proof the case _________________, while in civil court the _____________________drives the verdict.

beyond a reasonable doubt/ preponderance of evidence.

What is WAECUP?

Loss prevention and security procedures.



Waste, Accidents, Error, Crime, and Unethical practices (WAECUP).

___________________ is a simple and systematic method of employing safeguards to protect critical information. The ________ process includes five cyclical steps:

Operations security (OPSEC). The OPSEC process includes five cyclical steps:


-identify assets (critical information)


-Define the threat (collectors, capabilities, motivation)


Assess vulnerabilities


-analyze the risk (impact,priority,existing countermeasures, etc.)


-Develop and implement countermeasures

____________ is a term normally applied to the US federal government. It entails movement of critical functions and personnel to an alternate operating site or sites.

Continuity of Operations (COOP).

A business should identify a location for use as an _____________________ or crisis management center (CMC) from which the emergency response can be directed.

Emergency Operations Center (EOC).

____________________ are services, equipment, and techniques designed to locate, identify, and neutralize technical surveillance activities (electronic eavsdropping)

Technical Surveillance Countermeasures (TSCM).

List some "Lock Planning Considerations":

-total number of locks


-major categories of sectors of the system


-security objectives


-size and turnover of population


-related or supportive security subsystems


-Intelligence or information requirements


-criticality of asset exposure

Types of emergency incidents include:

-natural threats (i.e. all weather related emergencies)


-deliberate human-induced threats


(i.e. terrorism, arson, etc.)


-accidental human-induced threats (i.e. haz mat spills, computer outages, etc.)


The "all hazards" approach to planning should be employed to the maximum extents.

Peter Drucker, an authority on management, suggests that __________________ is the first and most crucial question in defining business purpose and mission (1974)

"Who is the customer?"


Ref: POA Sec. Mgmt P. 85


The ________________ is set out in writing by a business unit's top leadership. It does NOT focus on the day-to-day operations but provides a general direction.

The organizational strategy (strategic plan)


Ref: POA SM P.3It defines why the business exists and how it will maintain itself as a profitable, viable entity. Answering these questions requires looking at the business not only in the moment but ALSO three to five years out.

In risk assessment, the analyst attempts to answer three questions:

What can go wrong?


What is the likelihood that it would go wrong?


What are the consequences?


Ref: POA PS P.7

The most visible component of the HR department is ___________________.

Staffing


Ref: SM POA P. 6

The practice of borrowing capital to purchase assets that can increase revenue is called _____________.

Leveraging


POA SM P.23

A ____________ is a process for planning where money is to be allocated for the year.

Budget


It is a financial tool that estimates costs and revenue and provides a variance warning mechanism and fiscal uniformity for the company. Budgets are usually drawn up on a yearly or other periodic basis.

Read Standards and the Five D's

Ref: POA Sec. Mgmt P. 34 and P. 70

What are some of the reasons emergency management tests and exercises are conducted?

Emergency management


Emergency tests and exercises are conducted for many reasons:


-checking the workability of a plan or portion thereof


-determining the level of staff awareness and training


-evaluating the adequacy of emergency communications and


-identifying shortcomings in evacuation procedures.


Ref: Crisis Mgmt POA P. 12

Every part of an emergency management plan needs to be tested simultaneously. True or false?

False. However, each exercise should be designed to evaluate one or more aspects of the emergency plan and its implementation.


Read Crisis Mgmt POA P. 13!!

The elements required for a bombing are:


__________, ____________, _____________ and ________________.

Motive, material, knowledge and opportunity.


Preventing a bomb from entering the site may be achieved through access control and screening of visitors and goods, including mail.


Ref: CM POA P.61

Bomb threat evaluation consists of the Five R's:


_________________________________________.

-receive


-record


-report


-review


-respond


POA CM P.64

Each site should have its own TET (bomb threat evaluation team). True or false?

True. Because it is difficult for someone off-site to have the required knowledge of the site's operations and security.


POA CM P.64

Protection from a bomb is achieved through _____________ and _______________.

Distance and cover.

In general, risk can be reduced in three ways:

-preventing an attack by detecting it before it is under way


-protecting against an attack


-reducing (mitigating) consequences


Ref: POA PS P.8

List the ways that loss impact can be measured:

Loss impact can be measured in a variety of ways. One measure is the effect on employee morale; another is the effect on community relations. The most important measure overall is in dollars.


Ref: POA PS P.15

Notes: Read the Facilities Physical Security Measures Guideline thoroughly, also read up on strikes, mutual aid, and in the U.S. - more legal issues i.e. use of force, search & seizure, exclusionary rule... In 2016 the exam has some changes coming. Information is available on the ASIS website.
Good luck!!!

__________ proposes that proper design and effective use of the built environment can lead to a reduction in the opportunity, fear, and incidence of predatory stranger-to stranger type crime, as well as result in an improvement of the quality of life.

Crime Prevention Through Environmental Design (CPTED).

Ref: FPSM Guideline P.5

The _______________ theory suggests that an abandoned building or car can remain unmolested indefinitely, but once the first window is broken, the building or car is quickly vandalized.

"broken windows" theory (Wilson & Kelling, 1982)

Ref: FPSM Guideline P.7


Maintenance of a building and its physical elements such as lighting, landscaping, paint, signage, fencing, and walkways is critical for defining territoriality.

© 2015 Joe R., CPP - You may copy as long as you give credit to Joe R., CPP
© 2015 Joe R., CPP - You may copy as long as you give credit to Joe R., CPP