Vulnerability Category: Electrical Power
Respondent(s) did not answer this question.
21.EP 6 - Security System Supported by an UPS
In addition to an emergency generator, the security system is supported by an uninterupptible power supply?
Vulnerability Category: Electrical Power
Respondent(s) did not answer this question.
22.EP 3 - Secure Power Supply for Lighting
The power supply area for the lighting is secure?
Vulnerability Category: Electrical Power
Respondent(s) did not answer this question.
23.EP 9 - Uninterruptable Power Supply for Computers
Each computer, (mainframe, or P.C.) network, or server has an uninterruptable power supply (UPS) dedicated to it, so that no data will be lost in the event of a power outage?
Vulnerability Category: Electrical Power
Respondent(s) did not answer this question.
24.EP 8 - Uninterruptable Power Supply for CCTV
There is a UPS unit dedicated to the CCTV system?
Vulnerability Category: Electrical Power
Respondent(s) did not answer this question.
25.IL 5 - Lights Effecting CCTV
Lighting should not interfere with CCTV Cameras?
Vulnerability Category: Illumination
Respondent(s) did not answer this question.
26.IL 6 - Lights Blinding Patrol
Lighting should not blind guards while on patrol?
Vulnerability Category: Illumination
Respondent(s) did not answer this question.
27.IIP 6 - Weather Information
The organization has up-to-the-minute, highly localized weather information, in order to avoid premature closings, as well as to help prepare for emergencies?
Vulnerability Category: Information/Investigation Process
Respondent(s) did not answer this question.
28.MO 1 - Risk Analysis
A risk analysis is performed: whenever there is a major change to security related hardware or software; every three years for sensitive missions; or, every five years for non-sensitive missions, whichever is applicable?
Vulnerability Category: Management/Organization
Respondent(s) did not answer this question.
29.OV 8 - CCTV location
CCTV is not conducted in areas of the facility where an employee would reasonably expect privacy (locker rooms, restrooms, showers, private offices, etc)?
Vulnerability Category: Observation
Respondent(s) did not answer this question.
30.OV 3 - CCTV Monitored Real-time
CCTV monitors are monitored in real-time (as events occur)?
Vulnerability Category: Observation
Respondent(s) did not answer this question.
31.OV 4 - CCTV Activity Monitoring
CCTV cameras are programmed to project on the monitors only when the site is active (movement/activity is detected)?
Vulnerability Category: Observation
Respondent(s) did not answer this question.
32.OV 6 - Testing Night Vision Equipment
The night vision equipment is tested regularly?
Vulnerability Category: Observation
Respondent(s) did not answer this question.
33.OV 7 - Patrol Vehicles Equipped with Spotlights
All patrol vehicles are equipped with spotlights?
Vulnerability Category: Observation
Respondent(s) did not answer this question.
34.OV 5 - Night Vision Equipment
There is high quality night vision equipment available?
Vulnerability Category: Observation
Respondent(s) did not answer this question.
35.RFS 1 - Fire Retardant
The roof is made of fire retardant materials?
Vulnerability Category: Roofs
Respondent(s) did not answer this question.
36.SP/P/T 14 - Bomb Threat Procedures
The organization has procedures for action when a bomb threat is received?
Vulnerability Category: Security Procedures/Policy/Training
Respondent(s) did not answer this question.
37.PC 18 - Personnel Circumventing Security
Policy has been established detailing the action that can be taken against an employee for compromising, circumventing, or violating security policy, programs, procedures or systems?
Vulnerability Category: Security Procedures/Policy/Training
Respondent(s) did not answer this question.
38.SP/P/T 15 - Caller ID
The organization has caller-ID devices so incoming calls can be automatically traced?
Vulnerability Category: Security Procedures/Policy/Training
Respondent(s) did not answer this question.
39.SS 22 - Security System Monitoring
The security systems are monitored by security professionals?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
40.SS 17 - Security System Partitioned
The security systems are interoperable yet compartmentalized so that a failure in one system would not compromise another system?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
41.SS 18 - Security System Training
Training on security system operations is documented?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
42.SS 29 - Security System Operates in Phone Outage
Security systems will continue to operate as normal in the event of a telephone outage?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
43.SS 20 - Security System Test Documented
Test and evaluations of security systems are documented?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
44.SS 21 - Security System Problems Documented
Problems, concerns or malfunctions of a security system are accurately documented as well as the specific action taken to resolve the matter?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
45.SS 16 - Security System Operating Procedures
The organization has viable system operating procedures to minimize errors in security related data bases, program execution, communications and data entry?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
46.SS 23 - Security System Data Storage
Procedures exist for adequate in-house and off-site security storage of backup data, files, and applications?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
47.SS 24 - Alarm or Equipment Malfunction Procedures
There are readily available written procedures providing instructions as to required actions in case of an alarm or equipment malfunction or suspicious activity?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
48.SS 25 - Resetting Alarm
Alert/alarm responders are capable of resetting the alarm? (Have the access and skills?)
Vulnerability Category: Security System
Respondent(s) did not answer this question.
49.SS 26 - Security System Circumvented
Security systems are not easily circumvented?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
50.SS 27 - Security System Problem Reporting
Maintenance and performance problems with security systems are resolved in a timely manner?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
51.SS 28 - Security System Invading Privacy
Employees have confidence that security systems are enhancing the security of the workplace without invading their privacy?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
52.SS 12 - Security System Interference
The security systems do not interfere with other security systems?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
53.SS 15 - Perform Risk Analysis
A risk analysis is performed prior to the approval of design specifications for new security related computer systems and equipment acquisition and/or installation?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
54.SS 14 - Procedures for Security Data
The organization has implemented procedures and controls to preclude access to security related removable tape and disk files to prevent unauthorized users and programs from accessing, reading, modifying or damaging data on these media?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
55.SS 13 - Security System Control
The organization has effective and verifiable input and output control systems to ensure that only authorized and validated data is entered into security systems and that printouts and other media are only provided to authorized individuals?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
56.SS 10 - Preventive Maintenance
Preventive maintenance of security equipment is performed according to published schedules?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
57.SS 6 - Security System Dial-in
The security system software program is not accessible through remote/dialin access?
Vulnerability Category: Security System
Respondent(s) did not answer this question.
58.SS 19 - Security System Testing
