Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
38 Cards in this Set
- Front
- Back
Barriers, fences, and walls |
Outer defense, physical security, denied access, perimeter, defense begins at the perimeter |
|
Gates and barriers |
Outer defence; first line of defense, barriers- to deter or delay, natural/structural, gates should have limit to optimize control over that opening |
|
Miscellaneous openings |
Keep to a min. every opening is a risk; locking, surveillance or patrol issue; 96 square inch rule - must be gated at a minimum if opening exceeds 96 square inches |
|
Barrier protection |
Never completely effective, use as a delaying system, clear zone and height concerns, inspection |
|
Clear zones and inspection |
Attempted uninterrupted zone, should be sure to have a clear view to see any intruder, inspections need to be a weekly routine |
|
Inside the perimeter |
Unrooted /out side area within fence perimeter, second line of defense, basic house cleaning to keep things in order to notice disturbances |
|
Parking |
Should be patrolled, well lit, constantly surveilled, employee /visit visitor in perimeter |
|
Surveillance |
Security perimeter barrier should always be surveilled, particularly at night with long, uninterrupted sight lines that permit inspection and an entire area within minimum of movement |
|
Lighting |
Physical and psychological; will illuminate for outside perimeter barrier or concentrate on inside the barrier; psychological deterrent to make known exposure; physical immediate detection; avoid unprotected areas; lamps etc. |
|
Gates and thoroughfares |
Should be sufficient for operation of facility, important they be lit, check for contraband, Ext. should be maintenance as minimum no matter what |
|
Planning security |
There are always risk, results in carefully integrated system, most problems arise because no one has planned for them; buildings that are more efficient |
|
Doors, sensitive areas and offices |
Automatic door closing devices and strong deadbolts with heavy latches, monitor, remotely activated for storing high value materials, secure and open depending on access |
|
Traffic patterns and control personnel and visitors |
ID of employees, visitors, directing or limiting their movement and all incoming forward / outgoing materials in vehicles; establish a schedule for use of doors; employees have authorized points of entry; controlled and supervisor |
|
Employee identification |
Most common are badges and ID cards; tamper proof, only as effective as enforced; considered - number of employees, turnover rates, error, lost for words last stolen ID, reproduction of IDs and enforce the rules |
|
Employee - pass system and package control |
Exchange ID to gain access, single-pass, multiple pass, limit items brought in / taking out; enforce, check packages, well publicized in advance, and avoid discrimination |
|
Protective containers - files, safe invoke |
Final line of defense, vulnerable, depending on value and vulnerability of items to be stored, value to a thief, burglary / fire, additional support such as alarms, patrol, location; will not resist assault; filing cabinets |
|
Alarms - types or kinds, alarm sensors, alarm monitoring systems |
Fire, intrusion, General / specific sensors; perimeter, area, object; alarm monitoring systems - the Central Station, proprietary system, local alarm, auxiliary; local - alarm by chance, dial alarm system |
|
Alarm - cost and installation |
Monthly fee, installation fee, equipment, camera place and number of personal guards, cost and effectiveness analysis must consider effectiveness to achieve objectives of adequate security |
|
Planning - type and location of business |
Depending on size and complexity of business, assessing and understanding all aspects of business, common parameter |
|
Contingency plan - continuity, recovery, resumption, planning, Christ management, critical processes, an emergency response |
In order: -minimum business interruption, -short-term - restoration, -long-term - restoration, -event that is possible, not certain -managing events of a crisis -actions performed by functions, departments, etc. -act of reporting and responding to any emergency or major disruption of business |
|
Pandemic |
Cause harm to employees, unavailable to work; not so common but have major impact; planning; require emphasis on people and keeping them healthy; affect people not infrastructure, category 1 through 5 for CDC guidelines |
|
Fire prevention and protection |
Major part of lost prevention program; fire prevention - most worried; security personnel - think, solve problems, sense what detector can not; no fireproof building; fire load - amount of combustible materials that can occupy an interior space; nature of fire; byproducts of fire; classes of fire; education |
|
Safety and lost control |
OSHA laws; focus - safe working healthy work environment; general duty; MSDS sheets; responsibility; training employees; first Aid; employee awareness/ participation on an off site |
|
OSHA and training |
Standards that employers must fulfill for employees; must have MSDS sheets consist of 1. ID product an emergency instructions, 2. Hazard ingredients list and exposure limits, 3. Physical / chemical characteristics, 4. physical hazard and how to handle, 5. Relativity - when and how, 6. Health hazard - how and signs and symptoms, 7. Safe handling procedures |
|
MSDS sheets |
OSHA issued had hazardous communication standard, employees have the right to know the standards |
|
Employee awareness and participation |
One of the primary goals of OSHA, taking standards and applying them away from the job |
|
The dishonest employee |
Honesty - morale / conditioned, controllable variable; -moral - responsibility and respect, -condition - bearing consequences, reasoning, -no sure way to recognise the design as employee mainly complex reasons why |
|
Fraud or theft triangle |
1. Motive - reason to steal, resentment Exedra 2. Opportunity - absence of barriers inter inter 3. Desire - the attitude or desire builds up for something then the opportunity is caused by absence of barrier |
|
Danger signs |
Financial your responsibility, gambling, Berwyn, requesting advances, bouncing personal checks, problem creditors, -what they steal, and the method |
|
Program for internal security |
Need for management support, communicating the program, continuing supervision, program changes, violations, personnel policies, human resources, Ext. |
|
Human resources and the training process |
Human resources - the first line of defense for internal security, finding the person best qualified, must be qualified but potential risk based on martial grounds, must establish standards to reject risk to avoid injustice an expensive but worth it |
|
Employment history and reference checking |
Resume tells more than a restricted application, this is needed to avoid lawsuits, ect. Privacy legislation limits what can be asked, restrict police to give criminal case information to non enforcement agencies |
|
Backgrounds |
Driving records, registration, credit and criminal and education records, complete history especially for those handling money and management positions also for those considering promotion |
|
ADA- Americans with Disability Act |
Federal statute requires employers to focus on abilities of applicants not their disabilities, medical conditions and medical tests are prohibited does not protect against drug abusers or temporary disabilities, job announcement descriptions and applications must obey these guidelines |
|
Employee assistant programs |
Helping those with honesty, drug, alcohol problems, depression, wise investment, vary on type and size of company they're useful and successful |
|
Continuity of screening |
To ensure and screen out dishonesty, incompetent, unstable, employees, screening must continue on permanent basis, no relaxing standards, active supervision is always necessary |
|
Procedural controls |
1. other thing assets 2. separation of responsibility 3. promotion and rotation 4. computer records and electronic mail and funds transfers and faxes, 5. physical security |
|
When controls fail |
1. Undercover investigation 2. Prosecution 3. Discharging the thief consist of prosecution or straining firing for borderline cases |