Profile
P801 here! |
Monday, February 22, 2010, 6:48 PM
hints hints!
ATSYS 2 (final edition)SLIDES... topic 1: 4(?), 5, 6, 7, 8, 18, 19, 20, 21, 22, 27, 28, 29, 31, 32, 33, 34, 44, 45, 46, 53. topic 2: 2, 6, 8, 10, 17, 35, 46. topic 3: 4, 14, 15 topic 4: 2, 8, 9, 21, 22, 24 topic 5: 2, 3, 5, 7, 8, 156, 157 topic 6: 3, 10, 19, 30, 32, 38, 39, 40, 41, 42, 43, 44, 45, 55, 56, 65, 66 please ask around if i made any mistakes! selfish people get piles! GHOMGT SLIDES..... topic 2: 4, 5, 16, 27, 31 topic 3: 4, 22, 30, 32, 33, differentiating technical and non-technical. topic 4: 5, 7, 8, 9, 10, 11, 16, 17, 18, 26 topic 5: 6, 7, 8, 9, 14, 15, 16, 22, 25 topic 6: 3, 4, 14 topic 7-1: 4, 11, 12, 13, 14, 15 topic 7-2***: 21, 22, 45 *** for this topic mary got talk about... SMS: an organised approach to manage safety with necessary organisation structure and accountability. Rules & Regulations: provide code of conduct for airside users; control & regulate vehicles & their movements; manage & control airside drivers and operator of equipment/installations. topic 7-3: 19, 20, 21 PROJMGT PART A-MCQ/Short Qns topic 1: PSS functions Legal issues Paradigm shift in security Economic justification for security budget topic 2: facility characterisation-and those slides under this part (WE ALL HATE THIS) list threat motivation (both insider and outsider, the ideological economic personal that slide, adversary tactics, potential action of adversary) collect threat information (ALL) shrinkage topic 3: surveillance (the table) video alarm assessment system (diagram) system components and configuration CALCULATION (fl, fov, Dfar Dnear all those) camera-housing lighting system transmission system signal conditioning video switching equipment-manual switcher, homing sequential switcher video multiplexer (must learn how to connect the multiplexer/switcher all those) video monitor communication systems deficiencies of radio frequency systems topic 4: risk management relationship of PSS functions characteristics of an effective PSS protection-in-depth minimum consequence of component failure balanced protection performance characteristics probability of detection nuisance alarm rate vulnerability to defeat types of perimeter sensors (yes the table, roy say dont rmb the table, must read through ALL the sensors -.-) application (page 44 below that one) alarm communication subsystem (all wiring configurations-point to point, bus, star etc) personnel entry control token system (adv disadv) PIN system-concepts, code breaking, personal identification number personal identity verification (biometric)-concepts, adv disadv, types contraband detection methods of contraband detection metal detectors shape (page 80) explosive detectors locking mechanism-earning objectives, electromagnetic lock(operating principles) access delay elements of access delay dispensable barriers topic 5: analysis and evaluation qualitative analysis EASI model (adv disadv) adversary sequence diagrams (ASDs) site-specific ASD for sample facility calculate PI Labels: ralph |