Skip to main content

Currently Skimming:


Pages 180-306

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 180...
... 179 Appendix D Glossary GLOSSARY OF TERMS Aberration Any inherent deficiency of a lens or optical system. Aberrations are responsible for imperfections in shape or sharpness of the image.
From page 181...
... 180 Access controls Procedures and controls that limit or detect access to minimum essential infrastructure resource elements (e.g., people, technology, applications, data, and/or facilities) , thereby protecting these resources against loss of integrity, confidentiality, accountability, and/or availability.
From page 182...
... 181 Active attack An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations. Active content Software that is able to automatically carry out or trigger actions without the explicit intervention of a user.
From page 183...
... 182 Aerosol Fine liquid or solid particles suspended in a gas (e.g., fog or smoke)
From page 184...
... 183 Alarm assessment Verification and evaluation of an alarm alert through the use of closed-circuit television or human observation. Systems used for alarm assessment are designed to respond rapidly, automatically, and predictably to the receipt of alarms at the security center.
From page 185...
... 184 Americium (Am) A silvery metal; it is a man-made element whose isotopes Am-237 through Am-246 are all radioactive.
From page 186...
... 185 Area Maritime Security Committee The committee established to assist and advise in the development, review, and update of the area maritime security plan for its Captain of the Port zone. Area of responsibility A Coast Guard area, district, marine inspection zone, or Captain of the Port zone.
From page 187...
... 186 Assessment system elements Detection measures used to assist guards in visual verification of Intrusion Detection System Alarms and Access Control System functions and to assist in visual detection by guards. Assessment System elements include closed-circuit television and protective lighting.
From page 188...
... 187 Attack 2 Sabotage or the use of bombs, chemical or biological agents, nuclear or radiological materials, or armed assault with firearms or other weapons by a terrorist or quasi-terrorist actor that cause or may cause substantial damage or injury to persons or property in any manner. Attack 3 A discrete malicious action of debilitating intent inflicted by one entity upon another.
From page 189...
... 188 Authenticity A property achieved through cryptographic methods of being genuine and being able to be verified and trusted, resulting in confidence in the validity of a transmission, information or a message, or sender of information or a message. (Adapted from CNSSI 4009, NIST SP 800-53 Rev 4)
From page 190...
... 189 Background verification/check The process of checking an individual's character, general reputation, personal characteristics, or mode of living for consideration of employment, promotion, access to sensitive assets (such as national information) , or for continued employment.
From page 191...
... 190 Behavior monitoring Observing activities of users, information systems, and processes and measuring the activities against organizational policies and rule, baselines of normal activity, thresholds, and trends. Benefit Amount of risk reduction based on the overall effectiveness of countermeasures with respect to the assessed vulnerabilities (ARM)
From page 192...
... 191 Blower door assembly A calibrated device that measures the airflow rate into the facility during pressurization and out of the facility during depressurization BMS balance magnetic switch A set of contacts and magnets used to annunciate the opening / closing of door, window, or other device. Replaces magnetic position switches that are easily defeated and bypassed.
From page 193...
... 192 Breach of security An incident that has not resulted in a transportation security incident because security measures have been circumvented, eluded, or violated. Breakwire An IDS sensor that alarms an IDS when a wire or other cable is broken.
From page 194...
... 193 C3 Command, Control, & Communications C4 Command, Control, Communications, Computers & Integration - Military term to define an integrated system for overall control and operation of a complex operation Cable barrier Cable or wire rope anchored to and suspended off the ground or attached to chain-link fence to act as a barrier to moving vehicles. Cache A predetermined complement of tools, equipment, and/or supplies stored in a designated location, available for incident use.
From page 195...
... 194 Catamaran A vessel with twin hulls and usually a deck or superstructure connecting the hulls. Categorizing resources Resources are organized by category, kind, and type, including size, capacity, capability, skill, and other characteristics.
From page 196...
... 195 Check-In 2 The process through which resources first report to an incident. Check-in locations include the incident command post, Resources Unit, incident base, camps, staging areas, or directly on the site.
From page 197...
... 196 Codec A device or program capable of performing encoding and decoding on a digital data stream or signal. The word codec may be a combination of any of the following: 'Compressor-De-compressor', 'CoderDecoder', or 'Compression/Decompression algorithm'.
From page 198...
... 197 Common terminology Normally used words and phrases -- avoids the use of different words/phrases for same concepts, consistency, to allow diverse incident management and support organizations to work together across a wide variety of incident management functions and hazard scenarios. Communications Process of transmission of information through verbal, written, or symbolic means.
From page 199...
... 198 Conference of Radiation Control Program Directors (CRCPD) An organization whose members represent state radiation protection programs.
From page 200...
... 199 Contact List A list of team members and key players in a crisis. The list should include home phone numbers, pager numbers, cell phone numbers, etc.
From page 201...
... 200 Continuity of operations plan A document that sets forth procedures for the continued performance of core capabilities and critical operations during any disruption or potential disruption. (Adapted from CPG 101, CNSSI 4009)
From page 202...
... 201 Control server A controller that also acts as a server that hosts the control software that communicates with lower-level control devices, such as Remote Terminal Units (RTUs) and Programmable Logic Controllers (PLCs)
From page 203...
... 202 Corrective actions Implementing procedures that are based on lessons learned from actual incidents or from training and exercises. Correlation A measure of the degree of relationship between two variables.
From page 204...
... 203 Credible warning a believable but nonspecific message informing of danger from an imminent attack that has yet to be confirmed and lacks sufficient information for effective prevention Crew The personnel engaged onboard ship, excluding the master and officers and the passengers on passenger ships. Crime An act or commission of an act that is forbidden or the omission of a duty that is commanded by a public law and that makes the offender liable to punishment by that law.
From page 205...
... 204 Crisis Any global, regional, or local natural or human-caused event or business interruption that runs the risk of (1) escalating in intensity, (2)
From page 206...
... 205 Critical assets Those assets essential to the minimum operations of the organization, and to ensure the health and safety of the general public. Critical function Business activity or process that cannot be interrupted or unavailable for several business days without having a significant negative impact on the organization.
From page 207...
... 206 Criticality assessment (CA) Factors affecting the criticality of assets include: (1)
From page 208...
... 207 Cyber security The prevention of damage to, unauthorized use of, or exploitation of, and, if needed, the restoration of electronic information contained therein to ensure confidentiality, integrity, and availability. Includes protection and restoration, when needed, of information networks and wireline, wireless, satellite, public safety answering points, and September 11 communications and control systems.
From page 209...
... 208 Damage potential The potential for negative effects -- including immediate and long-term damage or loss, whether tangible or intangible -- resulting from an unintentional event or an attack on an asset. Mission-related damage potential (i.e., impacts that are critical to the owner's transportation institutional mission, including destruction or damage causing loss or reduction of functionality)
From page 210...
... 209 Decontamination The reduction or removal of a chemical, biological, or radiological material from the surface of a structure, area, object, or person. Defeat To overcome or vanquish; to beat; to prevent the success of; overpower; foil.
From page 211...
... 210 Depth of field The regions in front of and behind the focused distance where the image remains in focus. With a greater the depth of field, more of the scene near to far is in focus.
From page 212...
... 211 Detection system elements Detection measures that detect the presence of intruders, weapons, or explosives. Detection system elements include intrusion detection systems, weapons and explosives detectors, and guards.
From page 213...
... 212 Digital signature A value computed with a cryptographic process using a private key and then appended to a data object, thereby digitally signing the data. Director The ICS title for individuals responsible for supervision of a Branch.
From page 214...
... 213 Dispatch 2 The ordered movement of a resource or resources to an assigned operational mission or an administrative move from one location to another. Dispersion A measure of the extent to which values of a variable differ.
From page 215...
... 214 Drill A drill is a coordinated, supervised activity usually employed to validate a specific operation or function in a single agency or organization. Drills are commonly used to provide training on new equipment, develop or validate new policies or procedures, or practice and maintain current skills.
From page 216...
... 215 Effective standoff distance A standoff distance less than the Conventional Construction Standoff Distance at which the required level of protection can be shown to be achieved through analysis or can be achieved through building hardening or other mitigating construction or retrofit. Electroluminescent (EL)
From page 217...
... 216 Emergency alert system (EAS) A communications system of broadcast stations and interconnecting facilities authorized by the Federal Communications Commission (FCC)
From page 218...
... 217 Emergency operations center (EOC) 2 Special policy and incident management area, activated under certain conditions and staffed by representatives from the transit system, including top management, to serve as an information coordination point during special events or emergencies, and to authorize decisions that require/affect the legal authority of the system.
From page 219...
... 218 Emergency public information (EPI) Information that is disseminated primarily in anticipation of an emergency or at the actual time of an emergency and, in addition to providing information, frequently directs actions, instructs, and transmits direct orders.
From page 220...
... 219 Encryption The scrambling of information so that it is unreadable to those who do not have the code to unscramble it. Enriched uranium Uranium in which the proportion of the isotope uranium-235 has been increased by removing uranium238 mechanically.
From page 221...
... 220 Equivalent security measure An alternative measure that can take the place of a 33 CFR 104 and 105 required measure. Equivalent security measures must be approved by the commandant (G–MP)
From page 222...
... 221 Event 2 A planned, nonemergency activity. ICS can be used as the management system for a wide range of events, e.g., parades, concerts, or sporting events.
From page 223...
... 222 External exposure Exposure to radiation outside of the body. Externality The discrepancy between private and social costs or private and social benefits.
From page 224...
... 223 Fence protection An intrusion detection technology that detects a person crossing a fence by various methods such as climbing, crawling, cutting, etc. Fence sensor An exterior intrusion detection sensor that detects aggressors as they attempt to climb over, cut through, or otherwise disturb a fence.
From page 225...
... 224 Financial mechanisms One of the three mitigation strategy classifications (engineering alternatives; management practices; financial mechanisms)
From page 226...
... 225 Fixed route Service provided on a repetitive, fixed-schedule basis along a specific route with vehicles stopping to pick up and deliver passengers to specific locations; each fixed-route trip serves the same origins and destinations, unlike demand response. Includes route deviation service, where revenue vehicles deviate from fixed routes on a discretionary basis.
From page 227...
... 226 Function 2 Function refers to the five major activities in ICS: command, operations, planning, logistics, and finance/administration. The term function is also used when describing the activity involved, (e.g., the planning function)
From page 228...
... 227 General staff A group of incident management personnel organized according to function and reporting to the incident commander. The general staff normally consists of the operations section chief, planning section chief, logistics section chief, and finance/administration section chief.
From page 229...
... 228 Gray (Gy) A unit of measurement for absorbed dose.
From page 230...
... 229 Hazard 2 Any real or potential condition that can cause injury, death, or damage or loss of equipment or property. Hazard 3 An event or physical condition that has the potential to cause fatalities, injuries, property damage, infrastructure damage, agricultural loss, damage to the environment, interruption of business, or other types of harm or loss.
From page 231...
... 230 High-risk target Any material resource or facility that, because of mission sensitivity, ease of access, isolation, and symbolic value, may be an especially attractive or accessible terrorist target. Homeland security The Federal Government's efforts, in coordination with state and local governments and the private sector, to develop, coordinate, fund and implement the programs and policies necessary to detect, prepare for, prevent, protect against, respond to, and recover from terrorist or other attacks within the United States.
From page 232...
... 231 Illuminance The amount of light (luminous flux) falling on a specific area or surface.
From page 233...
... 232 attachments that provide direction and important information for management of the incident during one or more operational periods. Incident command Responsible for overall management of the incident and consists of the incident commander, either single or unified command, and any assigned supporting staff.
From page 234...
... 233 Incident management team (IMT) An IC and the appropriate Command and General Staff personnel assigned to an incident.
From page 235...
... 234 Infiltration The uncontrolled exchange of the building's interior air with outside air. Inflation A rise in the general price level over time, usually expressed as a percentage rate.
From page 236...
... 235 Ingestion pathway (50-mile EPZ) A circular geographic zone (with a 50-mile radius centered at the nuclear power plant)
From page 237...
... 236 Intellectual property rights (IPR) A category of intangible rights protecting commercially valuable products of the human intellect.
From page 238...
... 237 Intercom switcher Part of an intercom system that controls the flow of communications between various stations. Intercom system An electronic system that allows simplex, half-duplex, or full-duplex audio communications.
From page 239...
... 238 Intruder Unauthorized person, animal, or object in a restricted area. Intrusion Attacks or attempted attacks from outside the security perimeter of (an asset)
From page 240...
... 239 Iodine A nonmetallic solid element. There are both radioactive and non-radioactive isotopes of iodine.
From page 241...
... 240 Joint Information System (JIS) 2 Integrates incident information and public affairs into a cohesive organization designed to provide consistent, coordinated, accurate, accessible, timely, and complete information during crisis or incident operations.
From page 242...
... 241 Key pair A public key and its corresponding private key. Two mathematically related keys having the property that one key can be used to encrypt a message that can only be decrypted using the other key.
From page 243...
... 242 Lead agency The federal department or agency assigned lead responsibility under U.S. law to manage and coordinate the federal response in a specific functional area.
From page 244...
... 243 Line supervision A data integrity strategy that monitors the communications link for connectivity and tampering. In Intrusion Detection System sensors, line supervision is often referred to as two-state, three-state, or fourstate in respect to the number of conditions monitored.
From page 245...
... 244 Logistics section The section responsible for providing facilities, services, and material support for the incident. Low-level waste (LLW)
From page 246...
... 245 Malicious applet A small application program that is automatically downloaded and executed and that performs an unauthorized function on an information system. Malicious code Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
From page 247...
... 246 Maritime security levels The levels reflecting the prevailing threat environment to the marine elements of the national transportation system, including ports, vessels, facilities, and critical assets and infrastructure located on or adjacent to water subject to the jurisdiction of the United States. Maritime Transportation Security Act Legislation passed as public law 107-295 on November 25, 2002, that implements, mandates, and regulates the security for maritime transportation vessels, assets, and facilities.
From page 248...
... 247 Medical transitional structures and spaces Structures that are erected or leased for temporary occupancy to maintain mission-critical medical care during construction, renovation, modification, repair or restoration of an existing medical structure. Examples include urgent, ambulatory, and acute care operations.
From page 249...
... 248 Microwave sensor An IDS sensor that uses the disturbance of microwave energy to annunciate an intrusion Military installations Army, Navy, Air Force, and Marine Corps bases, posts, stations, and annexes (both contractor and government operated) , hospitals, terminals, and other special mission facilities, as well as those used primarily for military purposes.
From page 250...
... 249 Mitigation 2 The activities designed to reduce or eliminate risks to persons or property or to lessen the actual or potential effects or consequences of an incident. Mitigation measures may be implemented prior to, during, or after an incident.
From page 251...
... 250 Mode of service A system for carrying transit passengers described by specific right-of-way, technology and operational features. Typically includes the following: ⇒ Aerial Tramway: An electric system of aerial cables with suspended powerless passenger vehicles.
From page 252...
... 251 following types of operations fall under the above definitions provided they are not on a scheduled fixedroute basis: many origins-many destinations, many origins-one destination, one origin-many destinations, and one origin-one destination. "Paratransit" is another name for "Demand Response" service.
From page 253...
... 252 Monte Carlo simulation A technique used to evaluate models that are too complicated for an analytical solution. It involves the use of numerous trials to find the equilibrium of a system.
From page 254...
... 253 National Of a nationwide character, including the federal, state, local and tribal aspects of governance and polity. National Disaster Recovery Framework A guide that enables effective recovery support to disaster-impacted states, tribes, territorial and local jurisdictions.
From page 255...
... 254 Natural A term which refers to deriving access control and surveillance as a by-product of the normal and routine use of the environment. Natural disaster A physical capability with the ability to destroy or incapacitate critical infrastructures.
From page 256...
... 255 negative charge. A neutron has about the same mass as a proton.
From page 257...
... 256 Notification The formal advising, by voice or in writing, of specific information about an incident by the process described in the emergency response procedure governing the incident. Nuclear detonation An explosion resulting from fission and/or fusion reactions in nuclear material, such as that from a nuclear weapon.
From page 258...
... 257 Operating cost The expenses incurred during the normal operation of a building or a building system or component, including labor, materials, utilities, and other related costs. Operational period The time scheduled for executing a given set of operation actions, as specified in the Incident Action Plan.
From page 259...
... 258 Organizational areas of control Controls consist of the policies, procedures, practices, and organization structures designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected. Original equipment manufacturer (OEM)
From page 260...
... 259 Passenger-only ferries Vessels having only passenger decks, though they may also have space for bicycles. They can range from small boats about 50 feet long holding about 50 people to the 310-foot-long Staten Island ferries in New York, which can accommodate 6,000 people.
From page 261...
... 260 Perimeter barrier A fence, wall, vehicle barrier, landform, or line of vegetation applied along an exterior perimeter used to obscure vision, hinder personnel access, or hinder or prevent vehicle access. Persistent agent An agent that, upon release, retains its casualty-producing effects for an extended period of time, usually anywhere from 30 minutes to several days.
From page 262...
... 261 Piezoelectric An IDS sensor that uses the physical effect of voltage generation caused by the exertion of pressure on certain materials. Pilot house The enclosed space on the navigating bridge from which a ship is controlled when underway.
From page 263...
... 262 Planter barrier A passive vehicle barrier, usually constructed of concrete and filled with dirt (and flowers for aesthetics)
From page 264...
... 263 Ported coaxial An IDS sensor that uses a leaky (purposely designed cable with poor shield) to detect intrusion.
From page 265...
... 264 Preparedness 3 A continuous cycle of planning, organizing, training, equipping, exercising, evaluating, and taking corrective action in an effort to ensure effective coordination during incident response. Within NIMS preparedness focuses on the following elements: planning, procedures and protocols, training and exercises, personnel qualification and certification, and equipment certification.
From page 266...
... 265 Prevention 1 Plans and processes that will allow an organization to avoid, preclude, or limit the impact of a crisis occurring. The tasks included in prevention should include compliance with corporate policy, mitigation strategies, and behavior and programs to support avoidance and deterrence and detection.
From page 267...
... 266 Private security An independent or proprietary commercial organization whose activities include safeguarding the employing party's assets, ranging from human lives to physical property (the premises and contents) , responding to emergency incidents, performing employee background investigations, performing the functions of detection and investigation of crime and criminals, and apprehending offenders for consideration.
From page 268...
... 267 Progressive exercise program Comprised of five categories of activities for testing and evaluating the capabilities of transportation personnel to manage emergency situations using existing plans, procedures and equipment. The categories in a progressive exercise program build on each other, in both complexity and level of assessment provided for transportation management.
From page 269...
... 268 Protective action guide (PAG) A guide that tells state and local authorities at what projected dose they should take action to protect people from exposure to unplanned releases of radioactive material into the environment.
From page 270...
... 269 Public Key Infrastructure A framework consisting of standards and services to enable secure, encrypted communication and authentication over potentially insecure networks such as the Internet. A framework and services for generating, producing, distributing, controlling, accounting for, and revoking (destroying)
From page 271...
... 270 Qualification and certification This subsystem provides recommended qualification and certification standards for emergency responder and incident management personnel. It also allows the development of minimum standards for resources expected to have an interstate application.
From page 272...
... 271 Radioactivity The process of spontaneous transformation of the nucleus, generally with the emission of alpha or beta particles often accompanied by gamma rays. This process is referred to as decay or disintegration of an atom.
From page 273...
... 272 Rail fixed guideway system Any light, heavy, or rapid rail system, monorail, inclined plane, funicular, trolley, or automated guideway that: 1. Is not regulated by the Federal Railroad Administration; and.
From page 274...
... 273 Reception area A location separate from staging areas, where resources report in for processing and out-processing. Reception Areas provide accountability, security, situational awareness briefings, safety awareness, distribution of IAPs, supplies and equipment, feeding, and bed down.
From page 275...
... 274 Reflectance factor The ratio of the luminous flux reflected by a surface to the luminous flux it receives. Region As used in this document, "region" generally refers to a geographic area consisting of contiguous State, local, and tribal entities located in whole or in part within a designated planning radius of a core high threat urban area.
From page 276...
... 275 Report printers A separate, dedicated printer attached to the Electronic Security Systems used for generating reports utilizing information stored by the central computer. Request-to-exit device Passive infrared motion sensors or push buttons that are used to signal an Electronic Entry Control System that egress is imminent or to unlock a door.
From page 277...
... 276 Response Activities that address the short−term, direct effects of an incident. Response includes immediate actions to save lives, protect property, and meet basic human needs.
From page 278...
... 277 Retrospective Looking back at or examining data that have already been acquired. RF data transmission A communications link using radio frequency to send or receive data.
From page 279...
... 278 Risk analysis The body of theory and practice that has evolved to help decision-makers assess their risk exposures and risk attitudes so that the investment that is "best for them" is selected. Risk assessment 1 Process of identifying internal and external threats and vulnerabilities, identifying the likelihood of an event arising from such threats or vulnerabilities, defining the critical functions necessary to continue an organization's operations, defining the controls in place or necessary to reduce exposure, and evaluating the cost for such controls.
From page 280...
... 279 Risk views Risk views describe types of systems in terms of mode, geography, function, and ownership. These four views capture multiple ways of addressing systems and allow for a robust assessment of the Transportation Systems Sector.
From page 281...
... 280 RS-485 data IEEE Recommended Standard 485; a multi-drop serial data protocol with a maximum effective distance of 4,000 feet. Rural service Providing transportation across rivers and lakes when the construction of bridges is not warranted.
From page 282...
... 281 Secondary enclosure A portable enclosure system that can be installed within a facility if the facility cannot be sealed economically to maintain an overpressure but is suitable as a shell. Secondary hazard A threat whose potential would be realized as the result of a triggering event that of itself would constitute an emergency (e.g., dam failure might be a secondary hazard associated with earthquakes)
From page 283...
... 282 Security and emergency preparedness plan The formal plan that documents the transportation's system security program and also addressed the elements of that program that affect emergency preparedness for events resulting from intentional acts. Security breach An unforeseen event or occurrence that endangers life or property and may result in the loss of services or system equipment.
From page 284...
... 283 Security threat Any intentional action with the potential to cause harm in the form of death, injury, destruction, disclosure, interruption of operations, or denial of services. Segmentation for fingerprints The separation of an N finger image into N single finger images Segmented routes Portions of a fixed route.
From page 285...
... 284 Sensor processing Equipment and computer processors that receives sensor inputs and determines if an alarm condition exists. Provides binary output of processing decision.
From page 286...
... 285 Situation assessment/size up Includes information developed by the first person at the scene of an emergency and is basic information transmitted to the communications center, and then conveyed to other agency elements concerned with the control of the event. Situation assessments should be updated as the event changes and control measures are implemented to return the situation to normal.
From page 287...
... 286 Somatic effects Effects of radiation that are limited to the exposed person, as distinguished from genetic effects, which may also affect subsequent generations. See also teratogenic effects.
From page 288...
... 287 Standard operating guidelines A set of instructions having the force of a directive, covering those features of operations which lend themselves to a definite or standardized procedure without loss of effectiveness. Standard operating procedure (SOP)
From page 289...
... 288 Strategic risk Those risks that affect the entire transportation systems sector, threatening disruption across multiple stakeholder communities. The consequences of strategic risks can cross multiple sectors and can have far-reaching, long-term effects on the national economy, natural environment, or public confidence.
From page 290...
... 289 Surface burst A nuclear weapon explosion that is close enough to the ground for the radius of the fireball to vaporize surface material. Fallout from a surface burst contains very high levels of radioactivity.
From page 291...
... 290 Tabletop exercise A TTX is typically held in an informal setting intended to generate discussion of various issues regarding a hypothetical, simulated emergency. TTXs can be used to enhance general awareness, validate plans and procedures, rehearse concepts, and/or assess the types of systems needed to guide the prevention of, protection from, mitigation of, response to, and recovery from a defined incident.
From page 292...
... 291 Technical surveillance countermeasures Employment of services, equipment, and techniques designed to locate, identify, and neutralize the effectiveness of technical surveillance activities. Technological hazards Incidents that can arise from human activities such as manufacture, transportation, storage, and use of hazardous materials.
From page 293...
... 292 Terrorism 4 The FBI defines terrorism as, "the unlawful use of force against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in the furtherance of political or social objectives. Terrorist activity Includes a number of activities (including casing, reconnaissance, rehearsal, surveillance, and actual acts of violence)
From page 294...
... 293 Threat 1 The potential intentional act capable of disrupting or negatively affecting an asset. In other words, threats are deliberate attempts of a person or group to achieve various criminal or terrorist ends that may involve loss of life, loss of function, loss of visibility, and other objectives.
From page 295...
... 294 o Remote: Possible but unlikely to occur within the system's life cycle (25 years) o Improbable: Event will not occur within the system's life cycle (25 years)
From page 296...
... 295 Threat assessment The product or process of identifying or evaluating entities, actions, or occurrences, whether natural or man-made, that have or indicate the potential to harm life, information, operations, and/or property. (From DHS Risk Lexicon and adapted from CNSSI 4009, NIST SP 800-53, Rev 4)
From page 297...
... 296 Tracking and reporting resources A standardized, integrated process conducted throughout the duration of an incident. This process provides incident managers with a clear picture of where resources are located, helps staff prepare to receive resources, protects the safety of personnel and security of supplies and equipment, and enables the coordination of movement of personnel, equipment, and supplies.
From page 298...
... 297 Transitional structures and spaces Structures or spaces within buildings that are used to temporarily (less than 1 year) relocate occupants of another building while that building undergoes renovations, modifications, repairs, or restorations.
From page 299...
... 298 Unaccompanied baggage Any baggage, including personal effects, not accompanied by a person who is boarding the vessel. Unauthorized access Any access that violates the stated security policy.
From page 300...
... 299 Unsafe condition or act Any condition or act which endangers life or property. Unshielded wire Wire that does not have a conductive wrap.
From page 301...
... 300 Vertical rod Typical door hardware often used with a crash bar to lock a door by inserting rods vertically from the door into the doorframe. Vessel security officer The person onboard the vessel, accountable to the master, and designated by the company as responsible for (a)
From page 302...
... 301 Visual displays A display or monitor used to inform the operator visually of the status of the electronic security system. Visual surveillance The aggressor uses ocular and photographic devices (such as binoculars and cameras with telephoto lenses)
From page 303...
... 302 Vulnerability 2 A characteristic or flaw that renders an asset or system susceptible to destruction, incapacitation, or exploitation. Vulnerability assessment Systematic examination of a critical infrastructure, the interconnected systems on which it relies, its information, or product to determine the adequacy of security measures, identify security deficiencies, evaluate security alternatives, and verify the adequacy of such measures after implementation A systematic evaluation process in which qualitative and/or quantitative techniques are applied to arrive at an effectiveness level for a safeguards and security system to protect specific targets from specific adversaries and their acts.
From page 304...
... 303 Weakness A shortcoming or imperfection in software code, design, architecture, or deployment that, under proper conditions, could become a vulnerability or contribute to the introduction of vulnerabilities. (Adapted from ITU-T X.1520 CWE, FY 2013 CIO FISMA Reporting Metrics)
From page 305...
... 304 Working radio A radio that can communicate 2-ways (transmit and receive) , with the operations control center (OCC)
From page 306...
... 305 X-ray Electromagnetic radiation caused by deflection of electrons from their original paths, or inner orbital electrons that change their orbital levels around the atomic nucleus. X-rays, like gamma rays can travel long distances through air and most other materials.

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.