• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back

A Junior Military Leader (Such as, Corporal or sergeant)

Protect the specific sector with their respective perimeter from enemy intrusion

Officer (Captain, Major, Colonel)

Ensure his or her unit can complete its mission without encountering interference

Security Specialist or Intelligence Analyst

Protect classified information from exposure and ensure that the information is delivered to the appropriate personnel for decision-making purposes

Federal

Protect all citizens and their property from external threats, such as terrorism, disease or military attacks

State

Protect its residents and their property from thieves and/or natural disasters

Private Security

Protect the property or lives of their employers

Information Security

Protect information assets from hacking, illegal intercept, maintaining database integrity

Network/Computer Security

Protect the network and computer systems

Software Engineer

make their applications safe from viruses

Manager

Protect the information they own (accounting, HR) and ensure that information concerning employees and budgets is kept from improper disclosure

CEO

Holistically provide fiduciary protection to corporate assets

Private Security Guard Act of 2002

Set screening standards for all private security employees

Management

Determines the costs and the projected effectiveness of the security function

Managerial, Administrative, Preventive & Investigative

The primary roles for a Chief Security Officer

Vulnerability

A weakness within the system or environment of an asset

key security functions of Department of Homeland Security

Advise the US citizens of threats (HSAS), consolidation of 22 separate federal agencies, reduce or prevent terrorist attacks against U.S. minimize damage and recover from terrorist attacks that occur

Threat

Someone or something that can cause damage to an asset, either deliberately or accidentally

Hybrid security system

Combination of both proprietary and contract security personnel

Countermeasure or Control

Something that reduces either the impact or the likelihood of a threat exploiting a vulnerability

private security is concerned with?

Prevention, deterrence AND investigations and apprehensions

Public is 405 hour and Private is 8 hours

Typical difference between public and private law enforcement training