Professional Documents
Culture Documents
Cert Review, CPP, 2018, Domain 1
Cert Review, CPP, 2018, Domain 1
Examination
Spring 2018
www.asishouston.org
ASIS INTERNATIONAL – HOUSTON CHAPTER https://www.vexels.com/vectors/preview/143499/skyline-houston-illustration
SECURITY PRINCIPLES AND PRACTICES
• Task 01/01 Plan, develop, implement, and manage the organization’s security
program to protect assets
– 01/01/01 Principles of planning, organization, and control
– 01/01/02 Security theory, techniques, and processes
– 01/01/03 Security industry standards
– 01/01/04 Continuous assessment and improvement processes
– 01/01/05 Cross-functional organizational collaboration
• Task 01/02 Develop, manage, or conduct the security risk assessment process
– 01/02/01 Quantitative and qualitative risk assessments
– 01/02/02 Vulnerability, threat, and impact assessments
– 01/02/03Potential security threats (for example, all hazards, criminal activity)
• Task 01/03 Evaluate methods to continuously improve the security program with
auditing, review and assessment
– 01/03/01 Cost-benefit analysis methods
– 01/03/02 Risk management strategies (for example, avoid, assume/accept, transfer, spread)
– 01/03/03 Risk mitigation techniques (i.e., technology, personnel, process, facility design)
– 01/03/04 Data collection and trend analysis techniques
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 4 /66
• Task 01/04 Develop and manage external relations with law enforcement or others to
achieve security objectives
– 01/04/01 Roles and responsibilities of external organization and agencies
– 01/04/02 Methods for creating effective working relationships
– 01/04/03 Techniques and protocols of liaison
– 01/04/04 Local and national Public/Private Partnerships
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 5 /66
– The CSO reports to a senior-level executive to ensure a strong liaison with leadership, demonstrate
commitment and support, and highlight the importance of Security
ASIS CSO.1-2013, Sect. 4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 6 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 7 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 8 /66
– A single office (or person) should be the assets protection focal point
– Convergence
• 2005 definition (ASIS): The integration of traditional and IT security
• Contemporary definition: The merging of various fields to protect critical assets
Compliance
Safety
Emergency Risk
Management Management
Quality
Investigations
Assurance
ASIS POA, Vol. 1, Sect. 4.1.2, 4.3.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 9 /66
• Threats mutate
• Technology advances
• Management evolves
• Business transforms
• Technology
• Integration
• Security duties
• Legal and liability issues
• Regulations
• Public/private partnerships
• Antiterrorism
Evolving threats • Convergence
impact assets protection • Global business relationships
• Risk management
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 10 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 12 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 13 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 14 /66
– Effective security
“Swiss Cheese” philosophy of a
measures are layered security program
not oppressive or
burdensome
ASIS POA, Vol. 1, Sect. B
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 15 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 16 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 17 /66
– Formerly known as the Public Company Accounting Reform and Investor Protection Act of 2002
– Passed in response to accounting scandals at public companies in the late 1990s and 2000’s
– Established new accounting standards and business practices for U.S. public companies, their boards, and the
public accounting firms that serve them
– Compliance (particularly with Section 404) significantly burdens companies’ officers and boards, and imposes
both civil and criminal penalties on violators who commit fraud
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 18 /66
– Used to enhance the quality and reliability of products, services, and processes
– Compliance with a standard is voluntary but a regulation may require compliance with a standard
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 19 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 20 /66
– The sole U.S. representative to the two major non-treaty international standards organizations
• ISO
• International Electrotechnical Commission (IEC)
– Market driven, flexible, sector-based, led by the private industry, supported by the U.S. government.
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 21 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 22 /66
• PS-Prep…
– DHS Voluntary Private Sector Preparedness Accreditation and Certification Program designed to promote, not
require, nationwide resilience in an all-hazards environment by encouraging private-sector preparedness
ASIS POA, Vol. 7, Sect. 6.2.1.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 23 /66
• Policies…
– Provide broad descriptions of how operations will be conducted
– May be affected by different regulations for different businesses, such as
– Security policies…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 24 /66
– Are clearly articulated to prevent confusion ASIS POA, Vol. 1, Sect. 5.2
– Address a wide variety of topics, including all topics important for daily functions
– Security procedures...
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 25 /66
– The premises liability of owners has been extended into streets and other public areas
ASIS POA, Vol. 1, Sect. 7.2.2
– The ASIS Facilities Physical Security Measures Guideline defines risk management as "a business discipline
consisting of three major functions
1) Loss prevention
2) Loss control
3) Loss indemnification
ASIS GDL FPSM-2009, Sect. 2.32
– A proactive strategy for security/risk mitigation supports sustainable, healthy, productive organizations and is a
critical responsibility of senior leadership and governing boards
ASIS CSO.1-2013, Sect. 3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 26 /66
– Boards of Directors, shareholders, stakeholders, and the public expect organizations and agencies to
• Anticipate risks
• Manage risk
• Respond to threats
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 27 /66
– Risk: An uncertain situation with a number of possible outcomes, one or more of which is undesirable
– Risk includes all negative events for an organization, their impact, likelihood and how soon they may occur
(imminence)
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 28 /66
– Risk management
• Systematic
• Statistically-based
• Holistic
• Employs formal risk assessment and management
• Addresses sources of system failures
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 29 /66
– Risk is expressed in
• Threat
• Consequence (impact)
• Vulnerability (likelihood, probability)
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 32 /66
• Reputation/image - Goodwill/trust
• Brand recognition/loyalty - Relationships
• Vendor diversity - Longevity/history
• Past performance - Experience
• Quality assurance processes - Workforce morale
• Workforce retention - Management style
• Human capital development - Liaison agreements
- Market share
ASIS POA, Vol. 1, Sect. 4.1.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 33 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 34 /66
– Loss isn’t measured just by replacement – it includes lost income, sales, downtime, etc. (indirect costs)
ASIS POA, Vol. 1, Sect. 6.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 35 /66
– Both direct and indirect costs can be measured in terms of lost assets and lost income
• Often, a single loss results in both kinds of costs
ASIS POA, Vol. 2, Sect. 1.6
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 36 /66
– Safety-related events
may have
the same impact as
security events
ASIS POA, Vol. 2, Sect. 1.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 37 /66
– Threat classes
• Insiders
• Outsiders
• Collusion
C
– Threat tactic categories OUTSIDER
• Deceit
O
• Force L
•
•
Stealth
Combination
L
U
S
– Threat Spectrum: A detailed list of threats; key to
determining the Design Basis Threat (DBT)
I
O
N
– Design Basis Threat (DBT): The threat
against which
countermeasures INSIDER
are designed
to protect
ASIS POA, Vol. 2, Sect. 1.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 38 /66
– Historical data to assist in predicting threat likelihood is generally insufficient due to two reasons
• The information about past losses is unavailable
• The information about past losses is not organized to permit statistical processing
ASIS POA, Vol. 2, Sect. 1.4
– Threat considerations
• Motivation
• Tools
• Competence
• Knowledge
ASIS POA, Vol. 2, Sect. 1.7.2
– A risk analysis that considers the entire threat spectrum must be performed because
• As the threat capability increases, performance of individual security elements or the system as a whole will decrease
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 39 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 40 /66
– Economic environment
– Historical experience for the organization
– Historical experience for the industry
– Procedures and processes
– Criminal state-of-the-art
ASIS GDL GSRA 11 2002, Sect. A1
ASIS GDL GSRA 11 2002, Sect. A2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 41 /66
– Vulnerability analysis: A method of identifying the weak points of a facility, entity, venue or person
ASIS POA, Vol. 2, Sect. 1.7
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 42 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 43 /66
– Tests
• Functional testing (components are performing as expected)
• Operability testing (components are being used properly)
• Performance testing (repeats tests to determine component effectiveness against different threats)
– Testing conditions
• Day vs. night
• Different times of the year / seasons
• Operating hours vs. non-operating hours, shift changes
• Different weather conditions
• Normal operations vs. duress operations
(emergencies, labor strikes, etc.)
ASIS POA, Vol. 2, Sect. 1.7.3
– Testing approaches
1) Compliance-based
– Conformance to specified policies or regulations
– "Feature-based" approach
– Effective only for low threats, low loss impacts, and CBA-supported cost decisions
– Easier to perform
– The metric for this analysis is the presence of the specified equipment and procedures
2) Performance-based
– Evaluates how each element of the PPS operates
ASIS POA, Vol. 2, Sect. 1.7.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 44 /66
Vulnerability Assessment
Countermeasures implementation
approach to problem
solving"
evaluation
– The biggest mistake made when conducting a VA is to concentrate on individual PPS components and address
upgrades only at that level, not at the level of the overall system
ASIS POA, Vol. 2, Sect. 1.7.2
2) Delay measures
– Layers of security sum up to total delay time
– Delay time considered after detection
3) Response measures
– Time to interruption of adversary
– Accuracy of deployment
2) Key details about the cause of the alarm (what, who, where, how many)
ASIS POA, Vol. 2, Sect. 1.7.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 46 /66
– Mitigation
– Acceptance
– Transfer
– Spreading
– Avoidance
ASIS POA, Vol. 2, Sect. 1.2
• Risk Mitigation…
– A security countermeasure can be planned if the loss event has the following characteristics
• The event will produce an actual loss, measurable in some standard medium (money)
• The loss is not the result of a speculative risk
ASIS GDL GSRA 11 2002, Sect. A2
– Except for certain high-value, irreplaceable items, an organization should base its protection strategies on a
realistic, cost-effective rationale
ASIS POA, Vol. 1, Sect. 5.1
– Often overlooked as asset protection tools, procedural controls are the least expensive countermeasures one
can employ
• Revised procedures can enhance security while improving the bottom line for the enterprise
ASIS POA, Vol. 1, Sect. 5.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 49 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 50 /66
• The result of government realizing the revenue to be gained by enforcing law and confiscating criminals' property
• Civil torts became crimes against the king's peace; the "State" collected penalties instead of people obtaining civil judgements
– First police department organized by Sir Robert Peel, London, 1829 (the “Peelers”)
ASIS POA, Vol. 1, Sect. 7.1.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 51 /66
– Opponents argue that private policing reduced labor costs are achieved through
– Less qualified, less trained personnel
– Inadequate benefits to employees
– Focus on part-time employees
– Creative accounting methods
ASIS POA, Vol. 1, Sect. 7.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 52 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 53 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 54 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 55 /66
• Cost savings: Municipalities spend a lot on the salaries and benefits of public police officers
• Low priority call handling, like residential alarms: 20% = crime, and 80% = non-emergencies
• Police are diverted from crime prevention to produce arrest statistics and
other quantifiable measures
• Used in community policing, may reduce crime (lack of order can lead to high crime or fear of crime)
• A core goal of community policing is to focus on fear reduction through order maintenance techniques
• Disorder is characterized by reduced social controls, such as panhandling, loitering, youths taking over parks and street
corners, public drinking, prostitution, graffiti and other disorderly behaviors
• As disorder causes crime to increase, the community sinks further with conditions that lead to even more crime
• An alternative theory to socioeconomic impact of crime is that the completion of a crime simply requires the convergence in
time and space of an offender, a suitable target, and the absence of guardians
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 57 /66
• Communicates partnership models where security and police work together and advocates more of the same
• Reminderville, Ohio
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 58 /66
– Security management consultants and technical security consultants may undertake forensic assignments
ASIS POA, Vol. 1, Sect. 8.2, 8.2.1, 8.2.2, 8.2.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 59 /66
• Problem
• Need
• Challenge
• Goal
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 60 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 61 /66
– When a security consultant has been hired, stakeholders affected by his activities should be made aware
ASIS POA, Vol. 1, Sect. 8.7
– A “project coordinator” should coordinate the consulting project, typically the CSO or VP of Security
• A Security Project Committee (spin-off from the Security Advisory Committee – SAC – and chaired by the CSO or VP of
Security) may be formed to coordinate with the consultant
• Remember NDA’s
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 62 /66
• Purposes
– Determine adequacy of security measures – determine if a consultant is necessary
– Critically examine the security program
– Maintain general oversight of the security program
– Assist in meeting corporate and government requirements
• Objectives
– Review the corporate security program at least quarterly
– Determine if additional protective measures are needed
– Advise of any needed changes to security policies or procedures
– Review new program suggestions
– Field criticism or suggestions
ASIS POA, Vol. 1, Sect. 8.2.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 63 /66
– Means consciousness of the program, its relevance, and individual risk responsibility
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 64 /66
– One of the most important missions of security awareness is to familiarize employees with the organization’s
policies and procedures
– Good policies are not enough to ensure staff will react properly to an incident
2) Arrogant employees
ASIS POA, Vol. 1, Sect. 10.4.2
– May not contain specific security task information, but may point to other resources
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 65 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 66 /66
– Naiveté
– Indifference
– Offering group purchase opportunities for burglary and fire protection devices
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 67 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 68 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 69 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 70 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 71 /66
D. Tangible, intangible,
and mixed
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 72 /66
D. Tangible, intangible,
and mixed
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 73 /66
A. Procedural controls
B. Good management practices
C. Highly-aware employees
D. Access controls
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 74 /66
A. Procedural controls
B. Good management practices
C. Highly-aware employees
D. Access controls
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 75 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 76 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 77 /66
• Question 06: Which of the following is one of the most cost effective
assets protection tools?
A. Technology
B. Manpower
C. Information technology
D. Training and awareness
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 78 /66
• Question 06: Which of the following is one of the most cost effective
assets protection tools?
A. Technology
B. Manpower
C. Information technology
D. Training and awareness
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 79 /66
A. Executive management
B. The Security department
C. Leaders of each operating unit
D. Front-line security supervisors
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 80 /66
A. Executive management
B. The Security department
C. Leaders of each operating unit
D. Front-line security supervisors
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 81 /66
• Question 08: Which of the following is NOT one of the three tools of a
strategically-managed assets protection program?
A. Administration
B. Evaluation
C. Planning
D. Management
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 82 /66
• Question 08: Which of the following is NOT one of the three tools of a
strategically-managed assets protection program?
A. Administration
B. Evaluation
C. Planning
D. Management
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 83 /66
A. Inventory
B. Brand loyalty
C. Raw materials
D. Revenue
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 84 /66
A. Inventory
B. Brand loyalty
C. Raw materials
D. Revenue
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 85 /66
D. Elimination, Avoidance,
Transfer, Mitigation
and Spreading
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 86 /66
D. Elimination, Avoidance,
Transfer, Mitigation
and Spreading
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 87 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 88 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 89 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 90 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 91 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 92 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 93 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 94 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 95 /66
A. Security
B. Insurance
C. Legal
D. Safety
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 96 /66
A. Security
B. Insurance
C. Legal
D. Safety
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 97 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 98 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 99 /66
• Question 17: What are the three outer components (red, green and yellow
circles) of this depiction?
Risk
?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 100 /66
• Question 17: What are the three outer components (red, green and yellow
circles) of this depiction?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 101 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 102 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 103 /66
A. Criminal state-of-the-art
B. Physical environment
C. Social environment
D. Geographic location
E. All of the above
F. B & C
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 104 /66
A. Criminal state-of-the-art
B. Physical environment
C. Social environment
D. Geographic location
E. All of the above
F. B & C
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 105 /66
• Question 20: What are the two major types of risk assessments?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 106 /66
• Question 20: What are the two major types of risk assessments?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 107 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 108 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 109 /66
D. Public Environment
Supplement
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 110 /66
D. Public Environment
Supplement
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 111 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 112 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 113 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 114 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 115 /66
A. Mutating threats
B. Evolution of management
C. Increasing reliance on
technology
D. Transformation of business
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 116 /66
A. Mutating threats
B. Evolution of management
C. Increasing reliance on
technology
D. Transformation of business
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 117 /66
A. Physical
B. Inductive
C. Deductive
D. Heuristic
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 118 /66
A. Physical
B. Inductive
C. Deductive
D. Heuristic
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 119 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 120 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 121 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 122 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 123 /66
A. Strategically-important documents
B. Critical personnel
C. High-value, irreplaceable items
D. Bitcoins and fidget spinners
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 124 /66
A. Strategically-important documents
B. Critical personnel
C. High-value, irreplaceable items
D. Bitcoins and fidget spinners
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 125 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 126 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 127 /66
D. Qualitative, quantitative,
and mixed measures
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 128 /66
D. Qualitative, quantitative,
and mixed measures
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 129 /66
A. Risk assessment
B. Vulnerability assessment
C. Threat evaluation
D. Asset valuation
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 130 /66
A. Risk assessment
B. Vulnerability assessment
C. Threat evaluation
D. Asset valuation
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 131 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 132 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 133 /66
A. What can go wrong, what is the likelihood of it going wrong, and what is the
impact of it going wrong?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 134 /66
A. What can go wrong, what is the likelihood of it going wrong, and what is the
impact of it going wrong?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 135 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 136 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 137 /66
A. Acceptance
B. Performance
C. Operational
D. Functional
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 138 /66
A. Acceptance
B. Performance
C. Operational
D. Functional
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 139 /66
• Question 37: Which of the following is NOT one of the three tools of a
strategically-managed assets protection program?
A. Administration
B. Evaluation
C. Planning
D. Management
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 140 /66
• Question 37: Which of the following is NOT one of the three tools of a
strategically-managed assets protection program?
A. Administration
B. Evaluation
C. Planning
D. Management
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 141 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 142 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 143 /66
A. People/staffing
B. IT/information
C. Procedures/policy
D. Equipment/hardware
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 144 /66
A. People/staffing
B. IT/information
C. Procedures/policy
D. Equipment/hardware
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 145 /66
• Question 40: Which of the following is NOT one of the most critical
threats in high rise buildings?
A. Fire
B. Explosion
C. Workplace violence
D. Contamination of life-support
systems
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 146 /66
• Question 40: Which of the following is NOT one of the most critical
threats in high rise buildings?
A. Fire
B. Explosion
C. Workplace violence
D. Contamination of life-support
systems
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 147 /66
A. Availability
B. Affordability
C. Feasibility
D. Application to operations
E. Effectiveness
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 148 /66
A. Availability
B. Affordability
C. Feasibility
D. Application to operations
E. Effectiveness
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 149 /66
A. Management ratio
B. Supervision span
C. Span of control
D. Control spread
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 150 /66
A. Management ratio
B. Supervision span
C. Span of control
D. Control spread
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 151 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 152 /66
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 153 /66
A. Preventing an attack
B. Protecting against an attack
C. Responding to an attack
D. Mitigating consequences of
an attack
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 154 /66
A. Preventing an attack
B. Protecting against an attack
C. Responding to an attack
D. Mitigating consequences of
an attack
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com