456 Flashcards

1
Q

✓The second aspects of security is personnel security which is considered as the most
important.
✓The simple reason, is that security involves people and assets to be protected as source
of security threats.
✓It is an acknowledge fact that losses are attributed to negligence or active participation of
employees, either thief or sabotage

A

Personnel Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A process of inquiry into the character, reputation, discretion, integrity, morals and loyalty
of an individual to determine the suitability for appointment or access to classified matter.

A

Personnel Security Investigation (PSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

-This technique is very expensive but necessary in personnel security.
-It serves to verify information on the application form and to obtain other
information pertinent to decision to employ

A

Background Investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The quality of faithfulness to the organization, superiors,
subordinates and peers.

A

Loyalty-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The uprightness of character, soundness of moral principles and
truthfulness.

A

Integrity-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ability to act or decide with prudence; habit of wise
judgment

A

Discretion-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The distinctive identifying qualities that serves as index to the
essential nature of a person

A

Morals-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The sum of traits impressed by nature, education, and habit of a
person

A

Character-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The opinion which one is generally held

A

Reputation-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is the process of inspecting or examining with careful thoroughness

A

Positive Vetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the process whereby a subject’s reaction in a future critical situation is
predicted by observing his behavior, or by interviewing him, or analyzing his responses to a
questionnaire, such as honesty test.

A

Profiling-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a process of using devices in detecting deception during the interview stage.

A

Deception Detection Technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

-This type of investigation seeks to gather information on income and mode of living.
-Sometimes referred to as the earning-to-debt ration

A

Financial and Lifestyle Inquiry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is the placement of an agent in a role in which the
agent’s true identity and role remains unknown, in order to obtain information for criminal
prosecution or for recovery or limitation of asset losses.

A

Undercover Investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

-This is a valuable tool because it gives departing employees an opportunity to list
grievances.
-It offers security managers an opportunity to learn of problems not previously known.

A

Exit Interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is conducted to develop security awareness among employees of the company. It
should cover all employees, regardless of rank or position.

A

Security Education?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

-This consists of initial briefings made upon the new personnel and employees
on security and its various aspects, and its importance.
-They are also made aware of the security practices and procedures in the office
or unit

A

Security Orientation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

-It aims to train all personnel so that each shall possess the skills and vigilance
in the performance of their security responsibilities.
-This security indoctrination program may take the form of lectures on
appropriate subjects on security, showing of films bearing on security and other
instructional devices.

A

Security Indoctrination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This is a phase of security education program which makes use of security
poster, slogans, signs and stickers.
✓This is an indirect approach to inculcating security on the personnel and
employees, but it does serve its purpose.

A

Security Reminder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is another phase of security education program which is a positive effort
to sell security.
✓This may take various forms such as a personal recognition on a personnel
who has done an effective security job. This personal recognition will go far in
selling security to others.

A

Security Promotion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Attending lectures on instructions and discussions on
security will widen the personnel’s horizon, security wise, and probably make
him more security conscious and disciplined.

A

Security Seminars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

-This involves the protection of documents and classified papers from loss, access by
unauthorized persons, damage, theft and compromise through disclosure.

A

Document and Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It includes all information concerning document, cryptographic
devices developed projects and materials following on the categories of Top Secret,
Secret, Confidential and Restricted.(sensitive information)

A

Classified Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This refers to the assigning of information or material, one of the four security
categories after determination has been made that the information requires the security
protection as provided.

A

Classify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The act of removing the security classification from classified information or
matter.

A

Declassify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

It refers to the act of changing the assigned classification from classified
information or matter.

A

Reclassify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

It refers to the act of assigning the information or matter to the higher
classification than that previously assigned to it.

A

Upgrading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

It is the dissemination of classified information or matter to be limited
strictly to those people whose duties requires knowledge or possession thereof.

A

Need to know –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

refers to the grant of access to the classified matter only to
properly cleared person when such classified information is required in the performance of
their official duties.

A

Compartmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

This takes place through the loss of security which results from
unauthorized persons obtaining knowledge of classified matters.

A

Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The process of destroying a document which is no longer significant in the
organization.

A

Purging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

-It consist of any formula, pattern, device compilation of information which is used in one’s
business and which gives him an opportunity to gain an advantage versus competitors who
do not know or use it.

A

Trade secrets

33
Q

This is a grant made by the government to an inventor, conveying or securing to
him the exclusive right to make, use, or sell his invention for term of 17 years

A

Patent

34
Q

is a word, phrase, symbol or design, or a combination of words, phrases,
symbols or designs, that identifies and distinguishes the source of the goods of one party
from those of others

A

Trademarks

35
Q

a type of intellectual property that safeguards original works of authorship as soon as
the author fixes the work in a tangible form of expression.

A

Copyright

36
Q

This pertains to the importance of the firm with reference to the natural economy and
security

A

Relative Criticality

37
Q

This is the susceptibility of the plant or establishment to damage, loss, or disruption of
operation due to various hazards.

A

Relative Vulnerability

38
Q

Act of stealing small things or items of little value, especially habitually

A

PILFERAGE

39
Q

any acts or conditions which may result in the compromise of
information, loss of life, loss of destruction of property or disruption of the objective of the
installation.

A

SECURITY HAZARDS

40
Q

one who steals due to his inability to resist the unexpected
opportunity and has little fear of detection

A

Casual Pilferer-

41
Q

one who steals with preconceived plans and takes away any or
all types of items or supplies for economic gain.

A

Systematic Pilferer

42
Q

Intentional destruction or the deliberate damaging or destroying of property
or equipment.

A

SABOTAGE

43
Q

activity of spying or the use of spying or spies to gather secret information

A

ESPIONAGE

44
Q

These are activities designed to overthrow the government or intended or likely to
undermine or overthrow a government or other institutions.

A

SUBVERSIVE ACTIVITIES

45
Q

-The basic instrument for determining security vulnerability

A

SECURITY SURVEY

46
Q

-A planned and organized determination of facts concerning specific loss or damage of
assets due to threats, hazards or unsecured conditions.

A

SECURITY INVESTIGATION

47
Q

is a dialogue between the survey
team and the management and officials of a plant before the security survey is
conducted.

A

Entrance conference

48
Q

similar to entrance conference, and it is
done after the completion of the security survey.

A

Exit Conference

49
Q

This is conducted to check on the degree of compliance with the
recommended countermeasures and to determine the effectiveness and adequacy of the
countermeasures which are in effect

A

SECURITY INSPECTION

50
Q

A mechanical, electrical, hydraulic, or electronic device
designed to prevent entry into a building, room and container or
hiding place and to prevent the removal of items without the
consent of the owner

A

Lock-

51
Q

Portable and detachable lock having or sliding hasp
that passes through a staple ring or the like.

A

Pad lock-

52
Q

also called a ward lock) is a type of lock that
uses a set of obstructions, or wards, to prevent the lock from
opening unless the correct key is inserted. (old lock and
common sa mga baul)

A

Warded Locks

53
Q

a lock composed of fitted rotating
detainer discs.
-Known as wafer locks

A

Disc Tumbler Locks

54
Q

they are used in safe deposit boxes and
are for all practical purposes, pick proof.

A

Lever Tumbler Locks

55
Q

s a type of locking device in which a
sequence of symbols, usually numbers, is used to open the
lock. (parang password/pincode)

A

Combination Locks-

56
Q

are combination type locks and that no
key is used.
-Also known as digital locks are keyless for extra security

A

Code Operated Locks

57
Q

a device that is used to operate a lock.

A

Key

58
Q

A key to a single lock within a master keyed
system. A specific key, which operates the lock and has a
particular combination of cuts, or batting, which matches the
arrangement of the tumblers in the lock.( may specific lock
lang na pwede nitong buksan)

A

Change Key-

59
Q

A key will open all lock within a particular
area or grouping in a given facility.

A

Sub-master key

60
Q

A special key capable of opening a series of locks

A

Master Key

61
Q

A key that will open everything in a system
involving two or more master key groups

A

Grand master key

62
Q

all locks operated by change key

A

Great Grand Master Key

63
Q

the issue of key to open the main entrance and
the office.

A

Maison Keying

64
Q

a well constructed cabinet will have to be
procured. The cabinet will have to be sufficient size to hold the
original key to every lock in the system. It should be secured at
all times.

A

Key Cabinet-

65
Q

some administrative means must be set up to
record code numbers and indicates to whom keys to specific
locks have been issued.

A

Key Record-

66
Q

periodic inventories will have to be made of all
duplicate and original keys in the hands of the employees
whom they have been issued.

A

Inventories-

67
Q

addition to periodic inventory, an unannounced
audit should be made of all key control records and
procedures by a member of management.

A

Audits-

68
Q

a daily report should be made to the person
responsible for key control from the personnel department
indicating all persons who have left or will be leaving the
company. In the event that a key has been issued, steps should
be initiated to ensure that the key is recovered.

A

Daily Report

69
Q

issued by security for personnel to be
admitted in the installation. This system precludes those visitors
with escorts and personnel in the access list.

A

PASS AND BADGE SYSTEM

70
Q

an authenticated list of personnel given to
security personnel’s allowing them to gain entry to a
compound or installation or part thereof.

A

Access List-

71
Q

a system for personnel movement and
control whereby badges or identification are issued to
personnel upon entering an installation. Visitors are issued
also issued temporary badges when entering the
installation.

A

Badge System

72
Q

the pass or badge is coded for authorization to enter
specific areas, it is issued to an employee until his
authorization is terminated.

A

Single Pass System

73
Q

an exchange takes place at the entrance of each
controlled area.

A

Pass Exchange System

74
Q

This provides an extra measure of security by
requiring that an exchange take place at the entrance
of each restricted area

A

Multiple Pass System

75
Q

It refers to an area in which personnel or vehicles are controlled
for reasons of security.
✓ It is established to provide security for installation or facilities and
to promote efficiency of security operations and economy in the use
of security personnel.

A

Restricted area

76
Q

Are those areas access is restricted as to entrance or
movement by all unauthorized personnel and vehicles.

A

Controlled Areas

77
Q

Are those within the controlled area where a greater
degree of security is required.

A

Limited Areas

78
Q

Are used only for handling and storage of high value
cargo and classified documents.
✓ The number of people authorized to enter this area
should be strictly limited, and the area should be always
under surveillance.
✓ CCTV Control Room/Finance Area is a form of
exclusion area.

A

Exclusion Areas