Добавил:
north memphis Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

лаба_10 / лаб_10_17_2

.pdf
Скачиваний:
2
Добавлен:
27.10.2025
Размер:
2.61 Mб
Скачать

Vulnerability Category: Electrical Power

Respondent(s) did not answer this question.

21.EP 6 - Security System Supported by an UPS

In addition to an emergency generator, the security system is supported by an uninterupptible power supply?

Vulnerability Category: Electrical Power

Respondent(s) did not answer this question.

22.EP 3 - Secure Power Supply for Lighting

The power supply area for the lighting is secure?

Vulnerability Category: Electrical Power

Respondent(s) did not answer this question.

23.EP 9 - Uninterruptable Power Supply for Computers

Each computer, (mainframe, or P.C.) network, or server has an uninterruptable power supply (UPS) dedicated to it, so that no data will be lost in the event of a power outage?

Vulnerability Category: Electrical Power

Respondent(s) did not answer this question.

24.EP 8 - Uninterruptable Power Supply for CCTV

There is a UPS unit dedicated to the CCTV system?

Vulnerability Category: Electrical Power

Respondent(s) did not answer this question.

25.IL 5 - Lights Effecting CCTV

Lighting should not interfere with CCTV Cameras?

Vulnerability Category: Illumination

Respondent(s) did not answer this question.

26.IL 6 - Lights Blinding Patrol

Lighting should not blind guards while on patrol?

Vulnerability Category: Illumination

Respondent(s) did not answer this question.

27.IIP 6 - Weather Information

The organization has up-to-the-minute, highly localized weather information, in order to avoid premature closings, as well as to help prepare for emergencies?

Vulnerability Category: Information/Investigation Process

Respondent(s) did not answer this question.

28.MO 1 - Risk Analysis

A risk analysis is performed: whenever there is a major change to security related hardware or software; every three years for sensitive missions; or, every five years for non-sensitive missions, whichever is applicable?

Vulnerability Category: Management/Organization

Respondent(s) did not answer this question.

29.OV 8 - CCTV location

CCTV is not conducted in areas of the facility where an employee would reasonably expect privacy (locker rooms, restrooms, showers, private offices, etc)?

Vulnerability Category: Observation

Respondent(s) did not answer this question.

30.OV 3 - CCTV Monitored Real-time

CCTV monitors are monitored in real-time (as events occur)?

Vulnerability Category: Observation

Respondent(s) did not answer this question.

31.OV 4 - CCTV Activity Monitoring

CCTV cameras are programmed to project on the monitors only when the site is active (movement/activity is detected)?

Vulnerability Category: Observation

Respondent(s) did not answer this question.

32.OV 6 - Testing Night Vision Equipment

The night vision equipment is tested regularly?

Vulnerability Category: Observation

Respondent(s) did not answer this question.

33.OV 7 - Patrol Vehicles Equipped with Spotlights

All patrol vehicles are equipped with spotlights?

Vulnerability Category: Observation

Respondent(s) did not answer this question.

34.OV 5 - Night Vision Equipment

There is high quality night vision equipment available?

Vulnerability Category: Observation

Respondent(s) did not answer this question.

35.RFS 1 - Fire Retardant

The roof is made of fire retardant materials?

Vulnerability Category: Roofs

Respondent(s) did not answer this question.

36.SP/P/T 14 - Bomb Threat Procedures

The organization has procedures for action when a bomb threat is received?

Vulnerability Category: Security Procedures/Policy/Training

Respondent(s) did not answer this question.

37.PC 18 - Personnel Circumventing Security

Policy has been established detailing the action that can be taken against an employee for compromising, circumventing, or violating security policy, programs, procedures or systems?

Vulnerability Category: Security Procedures/Policy/Training

Respondent(s) did not answer this question.

38.SP/P/T 15 - Caller ID

The organization has caller-ID devices so incoming calls can be automatically traced?

Vulnerability Category: Security Procedures/Policy/Training

Respondent(s) did not answer this question.

39.SS 22 - Security System Monitoring

The security systems are monitored by security professionals?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

40.SS 17 - Security System Partitioned

The security systems are interoperable yet compartmentalized so that a failure in one system would not compromise another system?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

41.SS 18 - Security System Training

Training on security system operations is documented?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

42.SS 29 - Security System Operates in Phone Outage

Security systems will continue to operate as normal in the event of a telephone outage?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

43.SS 20 - Security System Test Documented

Test and evaluations of security systems are documented?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

44.SS 21 - Security System Problems Documented

Problems, concerns or malfunctions of a security system are accurately documented as well as the specific action taken to resolve the matter?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

45.SS 16 - Security System Operating Procedures

The organization has viable system operating procedures to minimize errors in security related data bases, program execution, communications and data entry?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

46.SS 23 - Security System Data Storage

Procedures exist for adequate in-house and off-site security storage of backup data, files, and applications?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

47.SS 24 - Alarm or Equipment Malfunction Procedures

There are readily available written procedures providing instructions as to required actions in case of an alarm or equipment malfunction or suspicious activity?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

48.SS 25 - Resetting Alarm

Alert/alarm responders are capable of resetting the alarm? (Have the access and skills?)

Vulnerability Category: Security System

Respondent(s) did not answer this question.

49.SS 26 - Security System Circumvented

Security systems are not easily circumvented?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

50.SS 27 - Security System Problem Reporting

Maintenance and performance problems with security systems are resolved in a timely manner?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

51.SS 28 - Security System Invading Privacy

Employees have confidence that security systems are enhancing the security of the workplace without invading their privacy?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

52.SS 12 - Security System Interference

The security systems do not interfere with other security systems?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

53.SS 15 - Perform Risk Analysis

A risk analysis is performed prior to the approval of design specifications for new security related computer systems and equipment acquisition and/or installation?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

54.SS 14 - Procedures for Security Data

The organization has implemented procedures and controls to preclude access to security related removable tape and disk files to prevent unauthorized users and programs from accessing, reading, modifying or damaging data on these media?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

55.SS 13 - Security System Control

The organization has effective and verifiable input and output control systems to ensure that only authorized and validated data is entered into security systems and that printouts and other media are only provided to authorized individuals?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

56.SS 10 - Preventive Maintenance

Preventive maintenance of security equipment is performed according to published schedules?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

57.SS 6 - Security System Dial-in

The security system software program is not accessible through remote/dialin access?

Vulnerability Category: Security System

Respondent(s) did not answer this question.

58.SS 19 - Security System Testing

Соседние файлы в папке лаба_10