Intro to Physical Security SPeD

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Interior barrier protectors

are used to protect against amateur intruders. These include an infrared beam or a trip wire.

Once you've determined your countermeasure options, you must make risk management decisions based on

the cost versus the benefit of protecting DoD assets.

Security systems include

• Interior intrusion detection systems (IDS) • Exterior IDS • Closed circuit television (CCTV) systems • Access control systems • Screening equipment • Two-way radios

Commanders must comply with and integrate

DoD physical security and installation access control policies into their FPCON plans.

Various types of physical security countermeasures include

Protective barriers • Site lighting • Security forces • Security systems • Facility access control • Lock and key systems • Storage containers and facilities

intrusion detection system (IDS)

Purpose is to deter, detect, document, and deny or delay intrusion. They detect changes in the environment which could be a result of an intruder, or something else that may require further investigation.

combination padlock

S&G 8077/AD, which is approved for storage of Secret or Confidential bulk or temporary indoor storage.

three types of approved combination locks used for the safeguarding of classified information.

The first type is a built-in electromechanical lock used to secure classified material in security containers, vaults and other secure rooms. The second type is the older style mechanical lock The third type is the combination padlock

SCIF

The intelligence community uses this type of storage facility for the storage of their sensitive compartmented information

the outermost area of responsibility.

The perimeter of an installation or facility

three types of key-operated locks used for other purposes.

These are high and low security padlocks and mortise locks.

Fence disturbance sensors

They detect disturbances of the fence.

The Mission Assurance Senior Steering Group (MA SSG)

This group functions as an Office of Secretary of Defense (OSD) and Joint Staff-level management and decision support forum with members of the Senior Executive Service and general or flag officers at the 1 and 2-star levels. Commanders of military installations and DoD facilities will ensure their ATEC communicates appropriate AT concerns through their Component chain of command or supervision to the MA SSG.

Antiterrorism Working Group (ATWG)

This group is responsible for assessing requirements for physical security, recommending and developing policy, preparing planning documents, and conducting criticality, vulnerability, and risk assessments. Members include the Antiterrorism Officer and representatives from all appropriate commands, organizations and tenant activities.

Threat Working Group (TWG)

This group is responsible for identifying foreign, domestic, and local threats and informing the installation commanding officer (CO) of current threat trends in the area of responsibility.

four types of interior IDS.

Volumetric detectors Operable opening switches Interior barrier protectors Proximity detectors

At a minimum, lock and key control procedures should include

a key register to list keys, document their issuance, return, and/or disposition.

self-inspection

a review conducted by members of your own organization, usually with the aid of a checklist.

Once you have identified the assets, threats, and vulnerabilities, you must then conduct

a risk analysis based on both the impact of an unwanted event and the likelihood that it could happen.

Doors are considered

a weak spot in a building. They are generally weaker than the building structure, making them less attack-resistant.

Force Protection is defined as

actions taken to prevent or mitigate hostile actions against DoD personnel, including family members, resources, facilities, and critical information.

The Mission Assurance Senior Steering Group (MA SSG) meets quarterly to provide

advocacy, coordination, and oversight to assist in both vertical and horizontal mission assurance alignment efforts on issues that cut across all DoD protection programs, including antiterrorism.

Secure rooms

are areas designated and authorized for the open storage of classified information. These facilities are usually built to commercial construction standards, and do not afford the extra security inherent with a "vault."

Restricted areas

are areas that require additional protection. Access is limited to authorized personnel and are designated for the security or safeguarding of property or material

Vaults

are constructed to meet strict forcible entry standards. Characteristics that set vaults apart from secure rooms include reinforced concrete on all walls, ceilings, and floors, plus a hardened steel door.

Volumetric detectors

are designed to detect a change in the environment in a particular area. There are both active and passive volumetric detectors.

• Barriers and fencing

are integral parts of all physical security systems. They establish boundaries and deter individuals.

Security forces

are made up of DoD civilian personnel, military personnel, and contract personnel who are employees of a private or commercial source contracted by the federal government, and even trained dogs, all of whom play an active part in protecting our national security and other DoD assets.

Law enforcement officials

are responsible for effective liaison with local, state, and federal law enforcement officials. This is vital in fostering good working relationships to coordinate support for antiterrorism concerns and efforts, and emergency response, as well as to address criminal incidents. Coordination activities support mutual understanding of jurisdiction and authority.

CI support personnel

are responsible for providing information on the capabilities, intentions, and threats of our adversaries. They must pay particularly close attention to those adversaries associated with foreign intelligence entities. History has proven that we must always be vigilant. In addition, personnel are there to provide valuable assessments of counterintelligence considerations in support of physical security programs.

Operable opening switches

are used on doors, windows, and other similar openings. They work with a magnetic switch, balanced magnetic switch (BMS) or high security switch (HSS). The BMS and HSS should be used in areas requiring high security.

Vulnerabilities

are weaknesses, characteristics, or circumstances that can be exploited by an adversary to gain access to or information from an asset.

DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)

authorizes commanders to issue regulations for the protection or security of property and places under their command.

• Warning signs

can be easily read by persons approaching on foot or in a vehicle. Restricted area perimeter boundaries should be posted in conspicuous and appropriate places to clearly identify the area.

Closed circuit television systems n.

can be implemented to provide further protection to national security and other DoD assets. They have a camera that captures a visual image, converts it to a video signal and transmits it to a remote location. At the remote location the image can be received, displayed, recorded, and printed.

two primary types of locks

combination and key-operated locks.

You must identify assets, threats and vulnerabilities before you can

conduct a risk analysis based on the impact and likelihood of an unwanted event happening.

There are several varieties of lighting used by DoD installations and facilities including .

continuous, standby, emergency, and movable lighting.

Restricted areas improve security by

controlling access and providing additional layers of security. Warning signs displaying "Restricted Area" must be posted at the boundary of each restricted area so they can be easily read by persons approaching on foot or in a vehicle.

Once you've calculated the risks, you must determine which

countermeasures you might employ to protect DoD assets by reducing vulnerabilities and mitigating threats.

Emergency lighting

depends on alternative power sources and is therefore reserved for times when regular lighting is not available

Invisible barrier protectors

detect motion within a specific area, using either microwave or infrared technology.

Properly designed and executed physical security programs should

deter or prevent, to the greatest degree possible, the loss of, theft of, or damage to an asset.

CCTV is an excellent means for

deterring and detecting loss, theft, or misuse of government property. It is is a reliable and a cost effective tool

The FPCON system allows commanders to be flexible and adaptable in

developing and implementing antiterrorism measures that are more stringent than those mandated by higher authorities whenever FPCONS are invoked.

Post orders establish

duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts.

The compliance inspection focuses on

ensuring regulatory requirements are being met, usually by someone who may be in your immediate chain of command or higher headquarters.

• Interior barriers

establish boundaries or lines of demarcation of different activities within an installation.

The OPSEC Officer

facilitates the process for identifying critical information, identifying threats to specific assets, assessing vulnerabilities to assets, analyzing risk to specific assets and to national security as a whole, and developing countermeasures against potential threats to national security and other DoD assets.

Access control is a process Access control is one of the inner layers in the overall security-in-depth approach.

for ensuring that only authorized personnel are allowed into a designated area. They are implemented to prevent unauthorized personnel from entering designated areas.

Point security

guarding a specific asset or resource

Facility access control procedures

include identification systems, methods of control, and entry and exit inspections, which include search procedures for packages, vehicles, and personal property.

High security key-operated padlocks

include the S&G 833C and the S&G 951 and are approved for high security protection

Security-in-depth

is a determination by the senior agency official that a facility's security program consists of layered and complementary security controls sufficient to deter, detect, and document unauthorized entry and movement within the facility. This is accomplished through the integration of active and passive complementary physical security measures.

The Antiterrorism Executive Committee (ATEC)

is an executive-level forum that meets at least semi-annually to develop and refine antiterrorism program guidance, policy, and standards and act upon recommendations of the Antiterrorism Working Group and Threat Working Group to determine resource allocation priorities and mitigate or eliminate terrorism-related vulnerabilities. When necessary, it integrates and aligns antiterrorism and mission assurance efforts, as the Mission Assurance Senior Steering Group does.

The Physical Security Officer

is charged with managing, implementing, aterm-20nd directing physical security programs. This person may also be responsible for the development and maintenance of physical security plans, instructions, regulations, and standard policies and procedures. They may also coordinate with local law enforcement agencies, antiterrorism officers, and loss prevention personnel.

An electric field sensor

is composed of multiple wires. One has a current running throughout and the other acts as a sensing mechanism. When something enters the electromagnetic field that is in the wire, the energy in the wire is disturbed and activates an alarm.

Physical security

is defined as that part of security concerned with active, as well as passive measures, designed to deter intruders, prevent unauthorized access, including theft and damage, to assets such as personnel, equipment, installations, materials, and information, and to safeguard these assets against threats such as espionage, sabotage, terrorism, damage, and criminal activity

Standby lighting

is similar to continuous lighting, except the lamps are not continuously lit. They are used when additional lighting is necessary

Continuous lighting

is the most common protective lighting system. It consists of a series of fixed lights arranged to flood an area continuously with overlapping cones of light.

Movable lighting

is used when supplemental lighting is necessary.

A buried line sensor

is, in essence, a chain link fence disturbance sensor, buried in the ground. It reacts to vibrations or pressure in a certain area.

The physical security officer is charged with

management, implementation, and direction of all physical security programs.

The Antiterrorism Officer

manages the installation or facility antiterrorism program. This program uses defensive measures to reduce the vulnerability of individuals and property from terrorist attacks.

A threat can be a

n indication, circumstance, or event with the potential to cause loss of, or damage to, an asset or capability

DoD assets include

people, information, equipment, facilities, activities, and operations.

PIE-FAO

people, information, equipment, facilities, activities, and operations.

Commanders will fully implement the FPCON measures according to

policy and remind their personnel to be alert for suspicious activities, such as the presence of unfamiliar personnel and vehicles, suspicious parcels, and possible surveillance attempts, and to report those activities

The two primary purposes of physical security

protection and prevention.

Area security

protects an entire area of the installation or facility.

Proximity detectors

provide point security, and are used to protect items inside a building. They are composed of a capacitance detector and a pressure mat.

Executive Order 10421

provided physical security for facilities deemed important to the national defense mission.

CI support is responsible for

providing valuable information on the capabilities, intentions, and threats of adversaries.

different methods used to secure large volumes of classified information.

secure rooms, vaults, and sensitive compartmented information facilities (SCIFs).

Countermeasures include

security measures that you employ in up-front facility design, in the day-to-day protection of DoD assets, and in times when threat levels increase.

The number of entrances and exits

should always be limited to the minimum necessary for mission accomplishment, as well as for emergency evacuation.

• Protective lighting

should enable guard force personnel to observe activities around or inside an installation without disclosing their presence. Adequate lighting discourages unauthorized personnel from entering a facility. Properly trained military working dogs supplement and enhance the capabilities of security forces and, therefore, facility protection.

Doors are a weak spot on a building and can be made of

solid steel to make them more attack-resistant.

Low security padlocks

sometimes referred to as secondary locks, are used for administrative control, on gates barring access to production facilities, for securing weapons racks contained within secured areas, and where secondary locks are specified. These locks provide only minimal resistance to forced or surreptitious entry and must not be used to secure classified material

At a minimum physical security plans should include

special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS).

• Natural defenses

such as waterways, forestations, and ditches, or manmade obstacles such as barricades and vehicle barriers provide for difficult approaches or exit routes.

SOPs provide

supplemental guidance for physical security programs and establish procedures for emergency events as well as operational and administrative procedures.

The TWG is comprised of

the Antiterrorism Officer, counterintelligence representative, law enforcement representative, operations security officer, information operations representative, and a chemical, biological, radiological, nuclear, and high yield explosives (CBRNE) representative.

DoD 5200.08-R

the Physical Security Program regulation

older style mechanical lock

the S&G 2937, which met prior standards and in some cases may still be used for classified storage.

The protection of national security and other DoD assets is accomplished through

the application of active and passive complementary security controls.

When identifying and assessing an asset, you must determine

the nature and value of that asset and the degree of impact if the asset is damaged or lost.

A threat is

the perceived imminence of intended aggression by a capable entity to harm a nation, a government, or its instrumentalities, such as intelligence, programs, operations, people, installations, or facilities.

Installation Commanders or Facility Directors who serve in management or leadership positions are responsible for

the safety and protection of the people and property under their command, the planning, coordinating, and integrating of all physical security matters into their installation, and the identification of mission essential capabilities.

Antiterrorism is defined as

those defensive measures used to reduce the vulnerability of individuals and property to terrorist attacks, to include limited response and containment. Antiterrorism physical security measures integrate facilities, equipment, trained personnel, and procedures into a comprehensive effort designed to provide maximum protection to personnel and other DoD assets.

The OPSEC officer analyzes

threats to assets and their vulnerabilities.

Site lighting is used

to enable guard force personnel to observe activities inside or outside the installation.

The goal of area security is to

try and consolidate as many assets as possible into one area. This is to intensify the protection efforts while maximizing the effectiveness of response forces.

Two-way radios

typically serve as the primary means of communication between response forces and their respective control centers, as well as communication between response force members.

electromechanical lock

used to secure classified material in security containers, vaults and other secure rooms. These locks meet the FF-L-2740 series federal specification which includes the Kaba Mas X-07, X-08, X-09, X-10, CDX-07, CDX-08, CDX-09 and CDX-10 locks as well as the Sargent and Greenleaf (S&G) 2740, 2740B, and 2890 Pedestrian Door Locks.

The first line of defense in any physical security system is

usually some form of perimeter protection system.

Emergency lighting is used

when regular lighting is not available. Standby lighting is used when additional lighting is necessary.

Mortise locks

which include deadbolt and cylindrical locks, are typically found in general office areas considered low security locking devices.

It is important for you to be familiar with the various coordinating activities that play a part in the physical security of DoD assets. These groups include the:

• Antiterrorism Executive Committee (ATEC) • Antiterrorism Working Group (ATWG) • Threat Working Group (TWG) • Mission Assurance Senior Steering Group (MA SSG)

The steps in the risk management process are:

• Identify assets • Identify threats • Identify vulnerabilities • Conduct risk analysis • Determine countermeasure options • Make risk management decisions


संबंधित स्टडी सेट्स

Wireless Networking Protocols quiz

View Set

Lewis Ch. 37 Valvular heart disease

View Set

Introduction to Networks Module 11 Quiz

View Set

AP Calculus Unit 2 Progress Check Part B

View Set