456 Flashcards
✓The second aspects of security is personnel security which is considered as the most
important.
✓The simple reason, is that security involves people and assets to be protected as source
of security threats.
✓It is an acknowledge fact that losses are attributed to negligence or active participation of
employees, either thief or sabotage
Personnel Security
A process of inquiry into the character, reputation, discretion, integrity, morals and loyalty
of an individual to determine the suitability for appointment or access to classified matter.
Personnel Security Investigation (PSI)
-This technique is very expensive but necessary in personnel security.
-It serves to verify information on the application form and to obtain other
information pertinent to decision to employ
Background Investigation
The quality of faithfulness to the organization, superiors,
subordinates and peers.
Loyalty-
The uprightness of character, soundness of moral principles and
truthfulness.
Integrity-
ability to act or decide with prudence; habit of wise
judgment
Discretion-
The distinctive identifying qualities that serves as index to the
essential nature of a person
Morals-
The sum of traits impressed by nature, education, and habit of a
person
Character-
The opinion which one is generally held
Reputation-
is the process of inspecting or examining with careful thoroughness
Positive Vetting
is the process whereby a subject’s reaction in a future critical situation is
predicted by observing his behavior, or by interviewing him, or analyzing his responses to a
questionnaire, such as honesty test.
Profiling-
is a process of using devices in detecting deception during the interview stage.
Deception Detection Technique
-This type of investigation seeks to gather information on income and mode of living.
-Sometimes referred to as the earning-to-debt ration
Financial and Lifestyle Inquiry
This is the placement of an agent in a role in which the
agent’s true identity and role remains unknown, in order to obtain information for criminal
prosecution or for recovery or limitation of asset losses.
Undercover Investigation
-This is a valuable tool because it gives departing employees an opportunity to list
grievances.
-It offers security managers an opportunity to learn of problems not previously known.
Exit Interview
is conducted to develop security awareness among employees of the company. It
should cover all employees, regardless of rank or position.
Security Education?
-This consists of initial briefings made upon the new personnel and employees
on security and its various aspects, and its importance.
-They are also made aware of the security practices and procedures in the office
or unit
Security Orientation
-It aims to train all personnel so that each shall possess the skills and vigilance
in the performance of their security responsibilities.
-This security indoctrination program may take the form of lectures on
appropriate subjects on security, showing of films bearing on security and other
instructional devices.
Security Indoctrination
This is a phase of security education program which makes use of security
poster, slogans, signs and stickers.
✓This is an indirect approach to inculcating security on the personnel and
employees, but it does serve its purpose.
Security Reminder
This is another phase of security education program which is a positive effort
to sell security.
✓This may take various forms such as a personal recognition on a personnel
who has done an effective security job. This personal recognition will go far in
selling security to others.
Security Promotion
Attending lectures on instructions and discussions on
security will widen the personnel’s horizon, security wise, and probably make
him more security conscious and disciplined.
Security Seminars
-This involves the protection of documents and classified papers from loss, access by
unauthorized persons, damage, theft and compromise through disclosure.
Document and Information Security
It includes all information concerning document, cryptographic
devices developed projects and materials following on the categories of Top Secret,
Secret, Confidential and Restricted.(sensitive information)
Classified Information
This refers to the assigning of information or material, one of the four security
categories after determination has been made that the information requires the security
protection as provided.
Classify
The act of removing the security classification from classified information or
matter.
Declassify
It refers to the act of changing the assigned classification from classified
information or matter.
Reclassify
It refers to the act of assigning the information or matter to the higher
classification than that previously assigned to it.
Upgrading
It is the dissemination of classified information or matter to be limited
strictly to those people whose duties requires knowledge or possession thereof.
Need to know –
refers to the grant of access to the classified matter only to
properly cleared person when such classified information is required in the performance of
their official duties.
Compartmentation
This takes place through the loss of security which results from
unauthorized persons obtaining knowledge of classified matters.
Compromise
The process of destroying a document which is no longer significant in the
organization.
Purging