ASIS PSP STUDY GUIDE (INTRO, CHAPTER 1 &2)
The Four Ds are: - Answers -1) Deter (always the first objective)
2) Detect (must include assessment)
3) Delay (begins after detection and communication to the response force)
4) Deny (prevent access
Although there can be many layers of security when it comes to defense-in-depth
strategies, a simple approach uses three main layers: - Answers -1. Outer layer
2. Middle layer
3. Inner layer
The outer layer may consist of: - Answers -barriers, protective lighting, signage, and
intrusion detection systems. The use of control measures at the perimeter (outer layer)
typically defines the property boundary, and channels both people and vehicles to
designated access points.
The middle layer comprises: - Answers -the exterior of the buildings on the site and may
include doors, windows, building facade, walls, and other openings such as ventilation
intakes and skylights.
The inner layer often consist of: - Answers -window and door protection devices,
barriers, and reinforced walls/doors, access control devices, intrusion detection
systems, video surveillance, protective lighting, and signage.
Design Basis Threat (DBT) - Answers -to calculate the effectiveness of the physical
security features, one must first identify the assets to be protected, the adversary's
skills, including tools and tactics, as well as the pathway an adversary might use.
Critical Detection Point (CDP) - Answers -The CDP is the point where the delay time
exceeds the response force time. Simply put, it is the time it takes for the detection and
response functions to interrupt (stop) the adversary before they can compromise or
destroy an asset (deny).
A post log/incident log is: - Answers -a chronological record of events that occur at a
single post each day
The main log (control log), is: - Answers -a record of every post at the site documenting
their significant events in a consecutive order.
Frog Syndrome: - Answers -is where a manager starts a training program by personal
instruction (jumps in), and then when their work-load increases, they abandon (jumps
out) the training program leaving it uncompleted.
General Orders: - Answers -are bodies of principles for the security officer. They include
items such as prohibiting smoking, eating, and personal cell phone use while on duty
and how they will maintain their post, wear their uniform, and use company equipment.
, Special Orders: - Answers -developed to address special events such as a board
meeting, holiday party, or public function. Special orders have a specific timeframe and
scope.
Post Orders (Standard Operating Procedures (SOPs)): - Answers -are the most
important document for the security force as it will list officer duties, explain any policies
and procedures and provides a basis for training. Post orders should be written clearly
and be easy to understand.
General Policy: - Answers -general objectives, responsibilities of staff, accountability,
reporting, auditing, etc.
People Policy: - Answers -workplace violence, emergency evacuation, prohibited items,
security awareness, etc.
Property Policy: - Answers -acceptable use of equipment, investigations, key control,
safeguarding property, etc.
Information Policy: - Answers -disclosure, marking, storage, handling, destruction of
documents, etc.
Policy vs Procedure - Answers -Procedures change more often than policies to meet
changing demands and conditions and are used to carry out security policies.
People Procedure: - Answers -response to threats, evacuations, visitor management,
employee access badging, etc.
Property Procedure: - Answers -securing assets, marking property, key issuance, officer
duties (post orders), etc.
Information Procedure: - Answers -marking, storage, and destruction of information and
technical surveillance countermeasures (anti-eavesdropping), etc.
Quality-Control (QC) and Quality-Assurance (QA): - Answers -QC focuses on the
officer's deliverables while QA is related to service quality.
Guard force response metric: - Answers -This is the time it takes to respond to duress
alarms, intrusion alarms, and other security events. Often in the contract, there is a
baseline response time requirement that officers can be measured against.
Response to customer requests metric: - Answers -This is the time it takes to resolve
customer requests often made via a telephone or online. Requests should be time-
stamped and assigned a tracking number. This metric is the most important metric that
an organization can monitor because it provides a good look into the reputation of the
security function and can help determine the resources needed.