Chief Security Officer CSO - Class 1,2,3 Domain 1 Flashcards

0
Q
  1. Human Resources and Intellectual Assets
  2. Ethics and Reputation
  3. Financial Assets
  4. Information/ Data
  5. Transportation, Distribution, and Supply Chain
  6. Legal, Regulatory, and General Counsel
  7. Facilities and Premises
  8. Environmental, Health, and Safety
  9. Vendor/Outsourcing
A

Model Profile of a Chief Security Officer Function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q
  1. Global Security Policy and Procedures Administration
  2. Technology and Infrastructure Protection
  3. Information Risk Management
  4. Business Continuity, Crisis Management, and Response
  5. Investigative and Forensic Science
  6. Safe and Secure Workplace Operations
  7. Tailored Business-Process Safeguards
  8. Insurance and Risk Transfer
  9. Risk Assessment, Analysis, Evaluation , and Testing
  10. Executive Protection
  11. Background and Due Diligence Investigation
  12. Business Conduct and Security Compliance
  13. External and Government Relations
  14. Business Intelligence and Counterintelligence Suppor
A

CSO - Benchmark Processes and Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Develops, influences, nurture trust-based relationship with business unit leaders, government officials, and professional organization. Act as a Consultant to all organizational clients.

A

Relationship Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Builds, motivates, and leads a professional team attuned to organizational culture,response to business needs, and committed to integrity and excellence.

A

Executive Management and Leadership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provides intellectual leadership and active support to the organization’s governance team to ensure risks are made known to senior management and the Board.

A

Governance Team Member

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides or sees to the provisions of technical expertise appropriate to knowledge of risk and the cost-effective delivery of essential security services.

Def. - Competencies, experiences, and advanced working knowledge of contemporary tradecraft, practices, and applications related to the topic of interest.

A

Subject Matter Expert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identifies, analyzes, and communicates on business and security-related risk to the organization.

A

Risk Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Develops global security strategy keyed to likely risks and collaboration with the organization’s stakeholders.

A

Strategist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Aids competitiveness and adds value by contributing dynamic, real-time critical thinking and solutions that enable the organization to “prevent” disruptions from occurring and minimize damage when they do occur. Engages in business processes to mitigate risk. Is a positive change agent on behalf of the organizational protection.

A

Creative Problem Solver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One key responsibility of the CSO is to?

A

Strategize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True/False:
The CSO is responsible and accountable for systematically gathering, assessing, and synthesizing information related to wide range of security-related events and threats specific to the organization and its various operations, which may adversely affect the security and safety of personnel and the profitability or reputation of the organization.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True/False
E
The CSO is responsible and accountable for ensuring that the enterprise is prepared for events or circumstances that potentially disrupts the continuity of business operations.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who should identify and understand the nature of security risk in the business environment, as well as the application of appropriate financial and managerial control to mitigate those risk.

A

CSO - Chief Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True/False

Generally, the outlook of the CSO should be more strategic than tactical.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True/False

CSO - is a senior executive leadership position?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of CSO serves as the executive responsible for the identification, development, implementation, and management of the organization’s [global] security strategies and programs?

A

Incumbent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An individual who can blend “common sense” control with efficient and productive business processes and procedures; requires creative problems solving and business acumen

A

Business Process Enabler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An individual who is willing to challenge establish business processes and procedures in the pursuit of excellence.

A

Change Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A leadership function responsible for providing comprehensive, integrated risk strategies (policy, procedures, management, training, etc.) to help protect an organization from security threats.

A

Chief Security Officer (CSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In terms of security issues, critical business processes include incident reps phones, and the Management of recovery efforts within the organization to restore critical systems and provide alternative facilities so that the organization can continue to function.

A

Critical Business Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are such things as facilities, equipment, inventory, and on-hand cash.

A

Financial and Physical Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Includes organization staff (leadership, directors, managers, employees), customers, and any others the organization has a duty to protect.

A

Human Capital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This term is being used in the context of any person currently functioning in the CSO role, being considered for the CSO role via an external recruitment effort, or any existing management team member who will be assigned the accountabilities recommended for the CSO role within this Standard.

A

Incumbent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Includes such things as reputation, customer confidence, client confidence, trade secrets, intellectual property, and goodwill.

A

Intangible Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Medical, financial, and emotional resources provided to employees, customers, and others involved in a catastrophic event or an attack on the organization.

A

Support Assistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is an organization-wide process that establishes a fit-for-purpose, strategic, and operational framework that upon implementation by the organization’s leadership?

A

A Business Continuity Management System (BCMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The developer and publisher of international standards.

A

ISO - International Standard

ISO - is a nongovernmental organization bring together stakeholders from the public, private and not-for-Profit sector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

True/False

ISO, does not regulate,legislate, or enforce.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the operating principle of the IOS’s management systems standard?

A

PLAN-DO-CHECK-ACT (PDCA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define & Analyze a Problem and Identify the Root Cause.

*Establish

A

PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Devise a Solution, Develop Detail Action Plan and Implement it Systematically.

  • Implements and Operates
A

DO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Confirm Outcomes Against Plan. Identify Deviation and Issues.

*Monitor & Review

A

CHECK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Standardize Solution - Review and Define next Issues.

*Maintain and Improve

A

ACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Assess-Protect-Confirm Improve model is also called the?

A

PDCA PLAN-DO-CHECK-ACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

True/False

Assets Protection can be performed by internal entities,external entities, or a combination.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Three concept form a foundation for any assets protection strategy.

A
A. Five Avenues to Address Risk
B. Balancing Security and Legal Considerations
C. The Five D's
D. A & C
E. All The Above
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the Five D’s

A

Deter, Deny, Detect, Delay, Destroy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the Health Insurance Portability and Accountability Act.

The criteria is set by the : (JCAHO) - Joint Commission on Accreditation of Health Organization.

A

(HIPPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is (QSR) Industry?

An Industry that features many company-owned restaurants and franchise stores around the world.

A

Quick-Service Restaurant Industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

True/False
Asset protection in the Telecommunications Sector has changed in the wake of industry deregulation; the boom in wireless, Internet, fiber optics and other telecommunications technologies; and in the United States, the designation of the telecommunications system a national critical Infrastructure.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

True/False

Asset Protection in the Telecommunications Sector now encompasses four major area?

A

TRUE

They are: Information Security, Network and Computer Security, Fraud Prevention, and Physical Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The sector which includes civil aircraft, military aircraft, missiles, space systems, and aerospace services, is characterized by fierce, global competition, large, complex contracts; international joint venues; and a large network of vendors, all of which factors significantly complicated asset protection strategies is called?

A

Aerospace Sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

True/false

There are Five forces that shapes the practice of asset protection.

A

TRUE

What are they: technology and touch, globalization in business, standards and regulation, convergence of security, and homeland security and the international security environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Suggests FINANCE.

What is designed as a support tool for security professionals and others with similar responsibilities.

Ref. It provides information on all aspects of security and related functions and helps readers balance costs and results in planning, developing, implementing sound risk management strategies.

A

Protection of Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

The greatest protection of corporate assets occur when an appropriate mix of security is in place in relation to the asset being protected, what are they?

Hint - 3 types:

A

Physical, Procedural, and Electronic Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The “integration of traditional and information [systems] security functions”

A

Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

True/False

Human factors must always be considered in the development of security strategies?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A strategy approach to managing assets protection programs likewise involve three tools, what are they?

A

Planning, Management, Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

This principle suggest that a single person can supervise only a limited number of staff members effectively.

A

Span of Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What term dictates that an individual report to only one supervisor?

A

Unit of Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

This theory asserts that people’s behavior is driven by basic needs at different levels?

A

Abraham Maslow’s theory

*know as the “hierarchy of need”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

True/False
Maslow’s theory is still recommended to analyze individual employee motivation and establish tailored rewards, such as pay, recognition, advancement, and time off.

The basic or lower-level needs must be met before a person is motivated by the next high level of need.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Self actualization need: self-fulfillment,realizing one’s full potential.

Esteem or recognition needs: respect from others and self

Affiliation or love needs: affectionate social and family relationships

Security or safety needs: protection from perceived harm

Physiological or survival needs: food, drinks, shelter

A

Maslow’s Hierarchy of Need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Theory X - content that workers are inherently lazy and tend to avoid work, and Theory Y states that workers are naturally motivated and want to work hard and do a good job.

Programs based on Theory Y according to ? Are more successful than those based on Theory X

A

McGregor’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

The Theory that is based on the premises that the opposite of satisfaction is not dissatisfaction but simply no satisfaction. The theory maintains that two sets of factors determine a worker’s motivation.

Attitude and Success

A

Herzberg’s Motivation-Hygiene Theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

True/False

Most risk management tools are either proactive or reactive, but insurance is a combination of both?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A formal social device for reducing risk by transferring the risk of several individual entities to an insurer.

A

Insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

The cause of a possible Loss is called.

A

Peril

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Felonious abstraction of insured property by any individual or individuals gaining entry to the premises by FORCE. There must be visible marks on the exterior of the premises at the place of entry, such as evidence of the use of tools, explosives, electricity, or chemicals.

A

BURGLARY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Felonious and forcible taking of property by violence inflicted upon a custodial or messenger, either by putting the person in fear of violence or by an overt act committed against the custodian or messenger who was cognizant of the act?

Ex. (Note Robbery) Sneak thievery, pick pocketing,confidence games, and other forms of swindling are not included in robbery coverage.

A

ROBBERY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Physical loss of or damage to the object concerned

A

Direct Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Such as the reduction of net income due to loss of use of e damaged or destroyed object?

A

Loss of Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Such as the costs of defending a liability suit and paying judgement or hospital and medical expenses following a personal accident?

A

Extra-Expense Losses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Retrospective coverage for events that occurred during a prior policy period but raised during the tail period?

A

“Tail Coverage”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

It is customary to exclude from coverage any person the insured knows to have committed any fraudulent or dishonest act, in the insured service or otherwise. The exclusion usually dates from the time the insured became aware of the fraudulent or dishonest act.

A

Fidelity Coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Insurance that is written to protect the insured against loss by burglary, robbery, theft, forgery, embezzlement, and other dishonest acts?

A

Crime Coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

There are two types of bonds that may be used for protection?

A

Fidelity

Surety

67
Q

Coverage written to protect the employer from the dishonesty of employees.

A

Fidelity Bond/Coverage

68
Q

Coverage that is intended to guarantee the credit or performance of some obligations by an individual.

A

Surety Bond/Coverage

69
Q

If a building or machine sustains physical damage, there will be at least an interruption in production or sales, resulting in financial loss

A

Business Interruption Insurance

  • It offers a number of coverage choices.
70
Q

A separate, wholly or principally owned firm, usually organized offshore, used to write insurance for the owning company. Sometimes a CAPTIVE insurer is owned Bryan association of two or more firms with common insuring interest. When appropriate they can make it easier to insure risks not acceptable to conventional carriers, can help make a more favorable expense ratio, and can open reinsurance resources not otherwise available.

A

Captive Insurance/Carrier

71
Q

What is the least Expensive countermeasures one can employ?

A

Protection tools and Procedural controls

72
Q

What is the standard profitability ratio that measures how much net income the business earns for each dollar invested by it’s owner?

A

(ROI) Return on investment

73
Q

AL + R
———- = ROI
CSP

AL = Avoid Loss
R = Recoveries made
CSP = Cost of the security program includes personal expenses, admin expenses, and capital cost.
A

One way to determine ROI

74
Q

Loss productivity for employees evacuating the building and for employees responding to the alarms, as well as the cost of fire department fines.

A

Hard Cost

75
Q

Includes wear and tear on building mechanical systems when alarms activated; the tendency for employees to learn to ignore alarms, thereby placing themselves in jeopardy when legitimate alarms activate; the potential for staff injuries during evacuations; and the frustration of he organization’s staff and fire department personnel due to the high number of alarms?

A

Soft Cost

76
Q

Security Related Measurements

A

Security Metrics

77
Q

The process of measuring an asset protection program’s cost and benefits as well as its successes and failures?

A

Security Metrics

78
Q

What report provided the security manager with data on which to base security decisions

A

Incident Report

79
Q

True/False
When submitting “loss report” the following practices are recommended.

  • All employees - most notify their immediate supervisor of any incidents or known or suspected asset losses.
  • First-line supervisor - should be responsible for completing reports for losses within their areas of responsibility.
  • The Security Manager - is responsible for reviewing the report. Correction or modification, if any are required, can then be made
A

TRUE

80
Q

True/False
The ultimate value of Incident reporting lies in the opportunities it creates for avoiding future incidents, events, and losses through planning, employee awareness training and security enhancement.

A

TRUE

81
Q

A group very familiar with the company’s products, materials, tools and resources.

A

Asset Protection Committee

82
Q

The preservation of company assets, both human and material, is the responsibility of every employee of the company.

A

LOSS REPORTING POLICY

83
Q

A report sought to compare the U.S. security industry to public law enforcement quantitatively.

A

Hallcrest Report

84
Q

Economics and operational issues - What is the distinction between public and private police

A

Cost

85
Q

Public Policing (Public Police Officers) are

A

Duly sworn by the Government.

86
Q

Private Policing (Private Police) are

A

Individuals who are employed by private firms or other organizations without Government affiliation.

However this distinction is not always clear. Some jurisdictions license and regulates private security personnel. Some Government units even grant special police status to private security personnel, giving them broad arrest powers.

87
Q

Carson - Identifies five specific categories of distinction between public and private policing, what are they?

A
Philosophical
Legal
Financial
Operational
Security/Political
88
Q

Private police may lack the moral authority that government can give to law enforcement.

A

Philosophical

89
Q

Private police are hobbled by law, with only limited powers of arrest, usually restricted to the commission of crimes within their presence. However, those with special police status have nearly all powers of public police, including authority to make arrest and carry guns.

A

Legal

90
Q

Private police can perform certain task more cheaper

A

Financial

91
Q

Private police are more flexible, can be assigned to specific locations, and spend nearly all their tour on the beat. They make fewer arrest, are burdened with little paperwork, and rarely make court appearances.

A

Operational

92
Q

Private police give citizens more control over their own safety by augmenting police efforts, helping to maintain order when police are spread thin. Also, private policing encourages citizen to follow community standards in a way that police officers cannot or do not.

A

Security/Political

93
Q

Peace Officer arrest powers are only available to what officer when he or she is on duty?

A

Special Police

94
Q

Acts as a liability shield to protect the officer (and his or her employer) from civil lawsuits. Although this shield is not available for reckless or malicious conduct, it protects the reasonable and prudent officer who makes a mistake in judgement or behavior.

A

Qualified immunity act

95
Q

Types of Security Consultants

A
  1. Security Management Consultants
  2. Technical Security Consultant
  3. Security Forensic Consultant
96
Q

Specialize in certain discipline, which comprises the foundation of their expertise (and reputation). Assist the client in managing the protection strategies for the business

A

Security Management Consultant

97
Q

Deals with investigation, identification and collection of evidence, identification of vulnerabilities, mitigation strategies and litigation.

A

Forensic security consultant

98
Q

Internal resource than can be formed to assist corporate executives and chief security officers in their effort to ensure that current security measures are adequate?

A

Security Advisory Committee

99
Q

Consciousness of an existing security program, it’s relevance, and the effects one’s behavior on reducing security risk.

A

Security Awareness

100
Q

The field of safeguarding a key person from harm.

This is practiced in the private world.

EP

A

Executive Protection

101
Q

Consciousness of an existing security program, it’s relevance, and the effect of one’s behavior on reducing security risk.

A

Security Awareness

102
Q

It is a continuing attitude that can move individuals to take specific actions in support. Of enterprise security.

A

Security Awareness

103
Q

What Type of supervisor is typically concerned with specific processes or activities. For these employees, security awareness focuses on how the security program aids or distracts from specific performance objectives.

A

First-Line Supervisor

104
Q

Tends to be held accountable for the successor their individual department, so they view the security program in terms of contribution towards the goal.

A

Middle Managment

105
Q

Personnel that must be aware do the security program because they are an enterprise’s top decision maker regarding risk and recourses.

A

Executive Management

106
Q

Most modern management approaches to employee motivation that the employee is willing and interested, and that while information and instruction are needed, coercion and pressure are not. The only formal exposure an employee gets to the security program may be a brief reference to it on the first day of work.

A

Individual Employee

107
Q

People who are not employees of the organization may also be effected by the security program.

They include vendors and suppliers, customers, service personnel, representatives of government, and members of the public.

A

Nonemployees

108
Q
Which level are standards in security developed on
A. Continental, National, International 
B. National, International, Foreign
C. Regional, National, International 
D. Regional, Federal, National
A

National, Regional, and International

109
Q

Suggests FINANCE.

What is designed as a support tool for security professionals and others with similar responsibilities.

Ref. It provides information on all aspects of security and related functions and helps readers balance costs and results in planning, developing, implementing sound risk management strategies.

A

Protection of Assets

110
Q

The greatest protection of corporate assets occur when an appropriate mix of security is in place in relation to the asset being protected, what are they?

Hint - 3 types:

A

Physical, Procedural, and Electronic Security.

111
Q

The “integration of traditional and information [systems] security functions”

A

Convergence

112
Q

True/False

Human factors must always be considered in the development of security strategies?

A

TRUE

113
Q

A strategy approach to managing assets protection programs likewise involve three tools, what are they?

A

Planning, Management, Evaluation

114
Q

This principle suggest that a single person can supervise only a limited number of staff members effectively.

A

Span of Control

115
Q

What term dictates that an individual report to only one supervisor?

A

Unit of Command

116
Q

This theory asserts that people’s behavior is driven by basic needs at different levels?

A

Abraham Maslow’s theory

*know as the “hierarchy of need”

117
Q

True/False
Maslow’s theory is still recommended to analyze individual employee motivation and establish tailored rewards, such as pay, recognition, advancement, and time off.

The basic or lower-level needs must be met before a person is motivated by the next high level of need.

A

TRUE

118
Q

Self actualization need: self-fulfillment,realizing one’s full potential.

Esteem or recognition needs: respect from others and self

Affiliation or love needs: affectionate social and family relationships

Security or safety needs: protection from perceived harm

Physiological or survival needs: food, drinks, shelter

A

Maslow’s Hierarchy of Need

119
Q

Theory X - content that workers are inherently lazy and tend to avoid work, and Theory Y states that workers are naturally motivated and want to work hard and do a good job.

Programs based on Theory Y according to ? Are more successful than those based on Theory X

A

McGregor’s

120
Q

The Theory that is based on the premises that the opposite of satisfaction is not dissatisfaction but simply no satisfaction. The theory maintains that two sets of factors determine a worker’s motivation.

Attitude and Success

A

Herzberg’s Motivation-Hygiene Theory

121
Q

True/False

Most risk management tools are either proactive or reactive, but insurance is a combination of both?

A

TRUE

122
Q

A formal social device for reducing risk by transferring the risk of several individual entities to an insurer.

A

Insurance

123
Q

The cause of a possible Loss is called.

A

Peril

124
Q

Felonious abstraction of insured property by any individual or individuals gaining entry to the premises by FORCE. There must be visible marks on the exterior of the premises at the place of entry, such as evidence of the use of tools, explosives, electricity, or chemicals.

A

BURGLARY

125
Q

Felonious and forcible taking of property by violence inflicted upon a custodial or messenger, either by putting the person in fear of violence or by an overt act committed against the custodian or messenger who was cognizant of the act?

Ex. (Note Robbery) Sneak thievery, pick pocketing,confidence games, and other forms of swindling are not included in robbery coverage.

A

ROBBERY

126
Q

Physical loss of or damage to the object concerned

A

Direct Loss

127
Q

Such as the reduction of net income due to loss of use of e damaged or destroyed object?

A

Loss of Use

128
Q

Such as the costs of defending a liability suit and paying judgement or hospital and medical expenses following a personal accident?

A

Extra-Expense Losses

129
Q

Retrospective coverage for events that occurred during a prior policy period but raised during the tail period?

A

“Tail Coverage”

130
Q

It is customary to exclude from coverage any person the insured knows to have committed any fraudulent or dishonest act, in the insured service or otherwise. The exclusion usually dates from the time the insured became aware of the fraudulent or dishonest act.

A

Fidelity Coverage

131
Q

Insurance that is written to protect the insured against loss by burglary, robbery, theft, forgery, embezzlement, and other dishonest acts?

A

Crime Coverage

132
Q

There are two types of bonds that may be used for protection?

A

Fidelity

Surety

133
Q

Coverage written to protect the employer from the dishonesty of employees.

A

Fidelity Bond/Coverage

134
Q

Coverage that is intended to guarantee the credit or performance of some obligations by an individual.

A

Surety Bond/Coverage

135
Q

If a building or machine sustains physical damage, there will be at least an interruption in production or sales, resulting in financial loss

A

Business Interruption Insurance

  • It offers a number of coverage choices.
136
Q

A separate, wholly or principally owned firm, usually organized offshore, used to write insurance for the owning company. Sometimes a CAPTIVE insurer is owned Bryan association of two or more firms with common insuring interest. When appropriate they can make it easier to insure risks not acceptable to conventional carriers, can help make a more favorable expense ratio, and can open reinsurance resources not otherwise available.

A

Captive Insurance/Carrier

137
Q

What is the least Expensive countermeasures one can employ?

A

Protection tools and Procedural controls

138
Q

What is the standard profitability ratio that measures how much net income the business earns for each dollar invested by it’s owner?

A

(ROI) Return on investment

139
Q

AL + R
———- = ROI
CSP

AL = Avoid Loss
R = Recoveries made
CSP = Cost of the security program includes personal expenses, admin expenses, and capital cost.
A

One way to determine ROI

140
Q

Loss productivity for employees evacuating the building and for employees responding to the alarms, as well as the cost of fire department fines.

A

Hard Cost

141
Q

Includes wear and tear on building mechanical systems when alarms activated; the tendency for employees to learn to ignore alarms, thereby placing themselves in jeopardy when legitimate alarms activate; the potential for staff injuries during evacuations; and the frustration of he organization’s staff and fire department personnel due to the high number of alarms?

A

Soft Cost

142
Q

Security Related Measurements

A

Security Metrics

143
Q

The process of measuring an asset protection program’s cost and benefits as well as its successes and failures?

A

Security Metrics

144
Q

What report provided the security manager with data on which to base security decisions

A

Incident Report

145
Q

True/False
When submitting “loss report” the following practices are recommended.

  • All employees - most notify their immediate supervisor of any incidents or known or suspected asset losses.
  • First-line supervisor - should be responsible for completing reports for losses within their areas of responsibility.
  • The Security Manager - is responsible for reviewing the report. Correction or modification, if any are required, can then be made
A

TRUE

146
Q

True/False
The ultimate value of Incident reporting lies in the opportunities it creates for avoiding future incidents, events, and losses through planning, employee awareness training and security enhancement.

A

TRUE

147
Q

A group very familiar with the company’s products, materials, tools and resources.

A

Asset Protection Committee

148
Q

The preservation of company assets, both human and material, is the responsibility of every employee of the company.

A

LOSS REPORTING POLICY

149
Q

A report sought to compare the U.S. security industry to public law enforcement quantitatively.

A

Hallcrest Report

150
Q

Economics and operational issues - What is the distinction between public and private police

A

Cost

151
Q

Public Policing (Public Police Officers) are

A

Duly sworn by the Government.

152
Q

Private Policing (Private Police) are

A

Individuals who are employed by private firms or other organizations without Government affiliation.

However this distinction is not always clear. Some jurisdictions license and regulates private security personnel. Some Government units even grant special police status to private security personnel, giving them broad arrest powers.

153
Q

Carson - Identifies five specific categories of distinction between public and private policing, what are they?

A
Philosophical
Legal
Financial
Operational
Security/Political
154
Q

Private police may lack the moral authority that government can give to law enforcement.

A

Philosophical

155
Q

Private police are hobbled by law, with only limited powers of arrest, usually restricted to the commission of crimes within their presence. However, those with special police status have nearly all powers of public police, including authority to make arrest and carry guns.

A

Legal

156
Q

Private police can perform certain task more cheaper

A

Financial

157
Q

Private police are more flexible, can be assigned to specific locations, and spend nearly all their tour on the beat. They make fewer arrest, are burdened with little paperwork, and rarely make court appearances.

A

Operational

158
Q

Private police give citizens more control over their own safety by augmenting police efforts, helping to maintain order when police are spread thin. Also, private policing encourages citizen to follow community standards in a way that police officers cannot or do not.

A

Security/Political

159
Q

Peace Officer arrest powers are only available to what officer when he or she is on duty?

A

Special Police

160
Q

Acts as a liability shield to protect the officer (and his or her employer) from civil lawsuits. Although this shield is not available for reckless or malicious conduct, it protects the reasonable and prudent officer who makes a mistake in judgement or behavior.

A

Qualified immunity act

161
Q

Types of Security Consultants

A
  1. Security Management Consultants
  2. Technical Security Consultant
  3. Security Forensic Consultant
162
Q

Specialize in certain discipline, which comprises the foundation of their expertise (and reputation). Assist the client in managing the protection strategies for the business

A

Security Management Consultant

163
Q

Deals with investigation, identification and collection of evidence, identification of vulnerabilities, mitigation strategies and litigation.

A

Forensic security consultant

164
Q

Internal resource than can be formed to assist corporate executives and chief security officers in their effort to ensure that current security measures are adequate?

A

Security Advisory Committee

165
Q

Consciousness of an existing security program, it’s relevance, and the effects one’s behavior on reducing security risk.

A

Security Awareness

166
Q

The field of safeguarding a key person from harm.

This is practiced in the private world.

EP

A

Executive Protection