Technical Security & Risk Glossary
A Glossary of Terms Used in Physical & Electronic
Security as well as Risk Management.
AACS
Automated Access Control System; An electronic or electro-mechanical system that requiring the entry of
personal identification information before allowing access to people/vehicles/objects to a site.
Access is only granted if this information matches data on the list of authorised users within a database.
Acknowledge
Action of a user to accept a message or indication.
Account Harvesting
Is the process of collecting all the legitimate account names on a system database.
AC Fail
Is when the power to a system, appliance or device fails and it is now supported by a back-up
battery or UPS.
Actionable intelligence
Data that has been gathered and collated in a way that makes sense and provides
context to the end user, enabling him or her to take appropriate action.
Analogue
Referring to a system or component that uses a system of measurement, response or storage in which
values are expressed as a magnitude using a continuous scale of measurement.
Anti-terrorism
Defensive measures used to reduce the vulnerability of individuals, forces, and property
to terrorist acts.
Anti-Pass-back
A security system feature that is used to prevent users from passing their credentials
back to a second person to enter a security-controlled area, such as a car park or employee building.
API
Application Programming Interface. A set of tools and procedures provided by the owner of an application
so that others can control, exchange data with, or extend the functionality of an application.
ASCII
American Standard Code for Information Interchange. A 7-bit character system that includes the alphanumeric
characters and printer control codes.
ASIO
Australian Security Intelligence Organisation.
Authentication
In access control technology, the process of confirming the correctness of a claimed identity.
Back Door
A backdoor is a tool installed after a compromise to give an attacker easier access to the
compromised system around any security mechanisms that are in place.
BACnet
Building Automation and Control Networks is a network communications protocol commonly used
in building automation and building management systems.
Ballast
Mass securely attached to a hostile vehicle.
BALUN
Balanced/Unbalanced. A device that links together dissimilar wire types and attempts to minimize
any negative effects to the signal that would normally result from the dissimilarity. Baluns are typically used to transmit
composite video signals over a twister pair cable instead of co-axial cable.
BCP
A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster
recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an
emergency.
Biometrics
In access control, the use of a person's physical characteristics, such as fingerprint
or iris pattern, to authenticate identity by using physiological and/or behavioral measurements.
BMS
An automated system used to maintain a balanced, efficient, and workable climate within the building
by monitoring and controlling lighting, temperature and security. Also alerts relevant staff teams when
maintenance or other actions
are required.
CCTV
Closed Circuit Television; Cameras linked to monitors for surveillance and security monitoring
on a site. The closed-circuit limits transmission of video signals to a connected group of authorised people.
CER
Communications Equipment Room.
CPTED
Crime prevention through environmental design. A method of improving security through strategic building
design, as well as the use of other environmental, organizational, or mechanical tactics.
DAS
Direct Attached Storage. A video storage technology used to connect hosts to storage devices via a direct,
one-to-one small computer system interface (SCSI) attachment.
Digital Footprint
The trail of information left behind whenever you access services online. This might
be passive (your personal information collected passively when search engines store your search history) or active (when you
share information on blogs or social media).
DOTL
Door Open Too Long (as in access control systems).
Double Knock
A system where a security detecting device must sense two "separate" events within a set
time frame before activating an alarm.
Duress alarm
Also known as a silent alarm; a device that enables a person to call for help without arousing suspicion.
DVI
Digital Video Interface. Used for connecting LED monitors to a PC.
DVR
Digital Video Recorder (now old technology).
Fault-line attack
An attack that exploits gaps in security coverage to gain access to a system or facility.
EOL
End of Line. In alarm systems it refers to a resistor network at the literal last point of the circuit
(installed inside the detector) to ensure monitoring of the detector
and
the integrity of the circuit itself.
Ethernet
The most widely installed LAN technology. Specified in a standard, IEEE 802.3, an Ethernet
LAN typically uses special grades of twisted pair wires. Devices are connected to the cable and compete
for access using a CSMA/CD protocol.
False Rejects
When an authentication system fails to recognize a valid user.
Fenestration Obscuration
Blocking the possible view through windows in order to prevent hostile surveillance
into the building on a secure site. Generally done by adding window frosting or using blinds.
FIFO
First In First Out (In reference to video data storage).
FOBOT
Fibre Optic Break Out Tray.
FDA
Forced Door Alarm.
GPRS
General Packet Radio Service is a packet oriented mobile data standard on the 2G and 3G cellular
communication network for mobile communications. Alarm systems and remote CCTV cameras often use this
technology to transmit signals back to a remote-control room.
GSM
Global System for Mobile Communications. Usually referred to as a signalling method for Intruder Detection
Systems and, even digital video surveillance via the mobile network.
GUI
Graphical User Interface (On a PC monitor).
Hardening
Is the process of identifying and fixing vulnerabilities on a system or building.
HLI
High Level Interface (Usually via software or database links).
Hostile Reconnaissance
The term given to the information gathering phase by those individuals or groups
with malicious intent, is a vital component of the attack planning process.
HR
Hostile Reconnaissance; Research and investigation into a site by a person/people with hostile intent,
who may use the information to harm the site, the people working there, its assets or reputation.
HVM
Hostile Vehicle Mitigation.
Hybrid NVR
A video recording device that incorporates functions of both network video recorders (NVRs)
and DVRs by accepting and converting video images from analogue cameras as well as IP video streams.
ICT
Information and Communications Technology.
IDS
Intruder Detection System.
Incident Management
The process of responding to an emergency event or reports of suspicious activity.
Infrared Illuminator
A light source that produces IR (invisible or barely visible) wavelengths of light.
IR illuminators are used as spotlights or floodlights for cameras
sensitive to reflected IR light (i.e. low light level conditions).
IP
Internet Protocol. The protocol through which information is sent from one
computer or mobile device to another via the Internet.
IP Monitoring
Refers to a new method of transmitting signals from an Intruder
Detection System directly to the remote alarm monitoring centre
via internet protocol; as opposed to the antiquated PSTN line or mobile network.
KVM
Keyboard Video Mouse.
LAN
Local Area Network.
LCD
Liquid Crystal Display.
LLI
Low Level Interface (Usually by physical relays and/or switches).
Lossless Compression
- Compression of a digital file (reducing the file size) that does not significantly
affect the quality or quantity of the data recovered when the
file is unzipped, so all of the data in the file can be restored.
Lossy Compression
- Compression of a digital file (reducing the file size) that results in a permanent loss
of data. This is sometimes acceptable and can be useful when sending a complex image as a .jpg,
for example. It’s up to the sender to decide which is a priority – reduced file size or
retaining the full quality and level of detail of the image.
Monitoring Centre Shell
All elements of the barrier surrounding an alarm monitoring centre including
the operations area, isolation department and amenities as required.
Multiplexing
To combine multiple signals from possibly disparate sources, in order to transmit them over
a single path.
NAS
Network Attached Storage (NAS). A network storage technology used to record and access data in
file format from one or more data storage devices.
NFC
Near Field Communication.
NTP
Network Time Protocol.
NVR
Network Video Recorder (has replaced the DVR).
ONVIF
A non-profit organization that works to advance the adoption of IP in the physical security market
using a global open standard.
OSI
OSI (Open Systems Interconnection) is a standard description or "reference model" for how messages
should be transmitted between any two points in a telecommunication network. Its purpose is to
guide product implementers so that their products will consistently work with other products. The
reference model defines seven layers of functions that take place at each end of a communication.
It is also valuable as a single reference view of communication that furnishes everyone a common
ground for education and discussion.
Panoramic View
An unbroken view of a wide
arc (often 180 degrees or more) of a horizon.
PIDS
Perimeter Intrusion Detection System.
PIN
Personal Identification Number.
PIR
Passive infra-red. A type of sensor technology that picks up infra-red heat from persons and triggers
an alarm.
PMG
Places of Mass Gathering.
PoE
Power over Ethernet. describes any of several standard or ad-hoc systems which pass electric power
along with data on twisted pair Ethernet cabling. This allows a single cable to provide both data
connection and electric power to devices such as IP cameras, sensors, VoIP intercoms and wireless
access points, etc. This configuration eliminates the need for a power supply & battery at the
remote end of cabling networks.
PoE+
Same as Power over Ethernet above but increases power capacity from 15.4 watts to 30 watts.
PPM
Planned Preventative Maintenance. In reference to security systems PPM should be carried out at
least once every six months.
PSIM
Physical Security Information Management. PSIM is software that provides a platform, and
applications, designed to integrate multiple unconnected security applications
and devices and control them through one comprehensive user interface.
RFID
Radio Frequency Identification. Used
in access control cards to transmit data to a proximity reader.
RS-485
Recommended standard in multi-drop communications. Commonly used in access control systems for
daisy-chaining up to 32 devices on one cable run.
RU
Rack Unit (44.45mm).
SAS
Server Attached Storage. A data sharing
storage technology that was developed as an alternative to DAS
to achieve a distributed video data approach through the use
of a LAN.
SAN
Storage Area Network. A data sharing storage technology that consists of communications infrastructure
and management layers.
SCEC
Security Construction and Equipment
Committee which is applicable for Australia only. The committee
reports directly to the Protective Security Policy Committee
(PSPC), established by the Australian Government to develop
guidelines for the protection of Australian Government resources.
SCR
Security Control Room.
SMOF
Single Mode Optical Fibre.
SMS
Short Message Service (used in mobile phones and tablets).
SMS
Security Management Systems.
SER
Security Equipment Room.
Tailgating
In access control, following an authorized individual into a secured area without gaining
authorized access yourself.
Target Hardening
Target hardening or mitigation is a process wherein a building is made into a more difficult
or less attractive target. It does not necessarily mean the construction of an impenetrable bunker,
although this would be the extreme case of target hardening.
UPS
Uninterruptible Power Supply.
USB
Universal Serial Bus.
UTC
Universal Time Coordinated.
UTP
Unshielded Twisted Pair.
VACP
Vehicle Access Control Point.
VBIED
Vehicle-borne improvised explosive device.
VCA
Video Content Analysis.
Video Analytics
A technology that uses software to analyse the video image stream. Video analytics
software may provide object detection, recognition, identification,
tracking, and analysis in a variety of surveillance applications.
Vigilance Decrement
- As people get tired in the course of the work, their attention wanes and they are
less likely to detect a person, object or other change in the
environment. This ‘vigilance decrement’ usually happens after
20-30 minutes of continuous work, depending on the level of concentration required.
VSB
Vehicle Security Barriers.
VMD
Video Motion Detection. When the current image changes beyond a threshold value, the system triggers
one or more pre-programmed actions and initiates an alarm.
VMS
Video Management System. PC based software to record, monitor and control video streams from remote
cameras and provide actionable intelligence to the operator.
VSS
Video Surveillance System.
VoIP
Voice over IP. Transmitting a voice over an IP network as opposed to an analogue telephone line.
Voice Code
A unique password used to swiftly identify authorized personnel.
Vulnerability Assessment
Is an in-depth analysis of building weaknesses and lack of redundancy to determine
mitigations or corrective actions that can be designed or implemented
to reduce vulnerabilities. The extent and depth of the analysis will depend upon the
size and function of the building and organization.
WAN
Wide Area Network.
Watermarking
Is the process of adding a semi-transparent layer of verbal or visual information onto
an image. Watermarking is often used as part of an authentication process in recorded video footage.
Wide Dynamic Range
When part of an image is extremely dark but another part is so bright you can't see any details,
that's dynamic range:—the difference in lighting.