FINALS Chapter 4 Flashcards

1
Q

Any recorded information regardless of its physical form or characteristics

A

DOCUMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This involves the protection of documents and classified papers from loss, access by
unauthorized persons, damage, theft and compromise through disclosure

A

DOCUMENT AND INFORMATION SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It includes all information concerning document, cryptographic devices developed
projects and materials following on the categories of Top Secret, Confidential,
Restricted, Secret, Unclassified.

A

CLASSIFIED INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This refers to the assigning of information or material, one of the four security categories after determination has been made that the information requires the security protection as provided.

A

CLASSIFY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information and materials the unauthorized disclosure of which would cause exceptionally grave damage to the nation, politically, economically, or from a security aspect. This category is reserved for the nation’s closest secrets and is to be used with great reserve. It is covered with legal size bond paper lined with ½ inch green border.

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information and material the unauthorized disclosure of which would endanger
national security, cause serious injury to the interest or prestige of the nation or
of any governmental activity or would be of great advantage to a foreign land. It is
covered with legal size bond paper lined with ½ inch red border.

A

Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information and material the unauthorized disclosure of which, while not endangering the national security would be prejudicial to the interest or prestige of the nation or any government activity, or would cause administrative embarrassment or unwarranted injury to an individual or would be of advantage to
a foreign nation. It is covered with legal size bond paper lined with ½ inch blue
border.

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information and material which requires special protection other than that
determined to be TOP SECRET, SECRET, or CONFIDENTIAL. Cover sheet is not
necessary, what is important is a bold “RESTRICTED” word at the top and at the
bottom of the bond paper.

A

Restricted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These include records that are liable records of which reproduction does not have same value as the original, record needed to recover cash to replace buildings, equipment, raw materials, finished products and records needed to avoid delay in restoration of production, sales and services

A
  1. Class A – Vital Records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These include records which loss might cause inconvenience but could be readily replaced and which not in the meantime present an insurmountable obstacle to the prompt restoration of the business.

A
  1. Class B – Useful Records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These include records of the reproduction of which will involve considerable expense and labor, or considerable delay.Operating and statistical records belong to this class as well as those to maintain check on efficiencies, operating costs, etc. also included are contracts, customers credit files, sales records of experiments in progress, etc

A
  1. ClassC – Important Records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These are the daily files, routine in nature so that even if lost or destroyed, will not
affect operation or administratio

A

ClassD – Non – Essential Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The act of removing the security classification from classified information or
matter.

A

DECLASSIFY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It refers to the act of changing the assigned classification from classified information or matter.

A

RECLASSIFY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It refers to the act of assigning the information or matter to the higher classification than that previously assigned to it.

A

UPGRADING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It is the dissemination of classified information or matter to be limited strictly to
those people whose duties requires knowledge or possession thereof

A

NEED TO KNOW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It refers to the grant of access to the classified matter only to properly cleared person when such classified information is required in the performance of their official duties.

A

COMPARTMENTATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This takes place through the loss of security which results from unauthorized persons obtaining knowledge of classified matters

A

COMPROMISE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The process of destroying a document which is no longer significant in the organization

A

PURGING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

These are information’s that in some special way relates to the status or activities of the possessor and over which the possessor asserts ownership.

A

PROPRIETARY INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

✓ It consist of any formula, pattern, device or compilation of information which is used
in one’s business and which gives him an opportunity to gain an advantage versus
competitors who do not know or use it. It may be a formula for a chemical compound, a process of manufacturing, treating or preserving materials, a pattern for machine or device, or a list of customers. A trade secret is a process or device for continuous use in the protection of the business.

A

TRADE SECRETS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

✓ This is a grant made by the government to an inventor, conveying or securing to him
the exclusive right to make, use, or sell his invention for term of 17 years.

A

PATENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

✓ Is a word, phrase, symbol or design, or a combination of words, phrases, symbols
or designs, that identifies and distinguishes the source of the goods of one party
from those of others.

A

TRADE MARKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

✓ Is a legal concept, enacted by most governments, giving the creator of an original work exclusive right to it, usually for a limited time. Generally, it is “the right to copy”,
but also gives the copyright holder the right to be credited for the work, to determine
who may adapt the work to other forms, who may performs the work, who may
financially benefit from it, and other related rights.

A

COPYRIGHT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

✓ It is an administrative determination by a competent authority that an individual is
eligible, from a security standpoint, for access to security classified information’s.

A

SECURITYCLEARANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

✓ The certification by a responsible authority that the person described is cleared for
access to classified matter at the appropriate level.

A

SECURITY CLEARANCE CERTIFICATE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

✓ It is valid for five years unless sooner revoked by the issuing authority.

A

FINAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

✓ It is valid for two years unless sooner revoked by the issuing authority.

A

INTERIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

✓ It is the potential damage or loss of an asset. The level of risk is a combination two factors: the value placed on that asset by its owner and the consequence, impact adverse effect of the loss or damage to that asset and the likelihood that a specific vulnerability will be exploited by a particular threat.

A

RISK

30
Q

✓ A process of selecting and implementing security countermeasures to achieve an
acceptable level of risk at an acceptable cost.

A

RISK MANAGEMENT

31
Q

✓ The analysis of risk includes examinations of the vulnerability, probability and criticality of
potential threats and includes natural and manmade risk.

A

RISK ANALYSIS

32
Q

✓ It refers to any individual, group, organization, or government that conducts activities or has the intention and capability to conduct activities detrimental to the individual, private or government entity.

A

ADVERSARY

33
Q

✓ Any information, facility, material, information, or activity which has a positive value to its owner whether it is an individual, private or government entity.

A

ASSET

34
Q

✓ An action taken or a physical entity used to reduce or eliminate one or more
vulnerabilities. The cost of possible countermeasures maybe monetary, but may also include non – monetary cost such as reduced operational efficiency, adverse publicity unfavorable working conditions, political consequences.

A

COUNTERMEASURES

35
Q

✓ It is the chance or likelihood that a loss will take place.

A

PROBABILITY

36
Q

✓ The impact of a loss as measured in financial terms.

A

CRITICALITY

37
Q

✓ Any weaknesses that could be exploited by an adversary to gain access to an asset.

A

VULNERABILITY

38
Q

✓ Eliminating or removing the risk totally from the business, government or industrial
environment for which the risk manager has responsibility.

A

RISK AVOIDANCE

39
Q

✓ Decreasing the risk by minimizing the probability of the potential loss.

A

RISK REDUCTION

40
Q

✓ Spreading the risk through compartmentation or decentralization to limit the impact of potential loss.

A

RISK SPREADING

41
Q

✓ Moving the financial impact of the potential loss over to an insurance company.

A

RISK TRANSFER

42
Q

✓ Planned assumption acceptance of the potential risk by making a deliberate managerial decision of doing nothing about the threat, or setting aside resources
for use in case of a specific loss incident.

A

RISK SELF - ASSUMPTION

43
Q

✓ This pertains to the importance of the firm with reference to the natural economy
and security.
❖ Example is gasoline depots, communication transmission lines, and power
plants.

A

RELATIVECRITICALITY

44
Q

✓ This is the susceptibility of the plant or establishment to damage, loss, or
disruption of operation due to various hazards.
❖ Example is the location of the building, the machines, or presence of
possible poisons.

A

RELATIVE VULNERABILITY

45
Q

✓ Any acts or conditions which may result in the compromise of information,
loss of life, loss or destruction of property or disruption of the objective of
the installation.

A

SECURITY HAZARDS

46
Q

Act of stealing small things or items of little value, especially habitually.

A

PILFERAGE

47
Q

One who steals due to his inability to resist the unexpected opportunity and has little
fear of detection.

A
  1. Casual Pilferer
48
Q

One who steals with preconceived plans and takes away any or all types of items or
supplies for economic gain.

A
  1. Systematic Pilferer
49
Q

✓ Deliberate destruction or the deliberate damaging or destroying of property or
equipment.

A

SABOTAGE

50
Q

✓ The activity of spying or the use of spying or spies to gather secret information.

✓ This is a hazard because people may come to know the confidential processes or procedures
of a certain organization or business establishment

A

ESPIONAGE

51
Q

✓ These are activities designed to overthrow the government or intended or likely to undermine or overthrow a government or other institutions. It results to the disruption of the normal operations of an institution or organization

A

SUBVERSIVE ACTIVITIES

52
Q

✓ The basic instrument for determining security vulnerability. Critical on-site examination and analysis of an industrial plant, business, a home or public or private institution done to ascertain the facility’s current security status. This complements security survey in its attempt to prevent losses of company properties.

A

SECURITY SURVEY

53
Q

✓ An entrance conference is a dialogue between the survey team and the management, and officials of a plant before the security survey is conducted.

A
  1. ENTRANCE CONFERENCE
54
Q

✓ The exit conference is similar to entrance conference, and it is done after the
completion of the security survey.

A
  1. EXIT CONFERENCE
55
Q

✓ This is conducted to check on the degree of compliance with the recommended
countermeasures and to determine the effectiveness and adequacy of the
countermeasures which are in effect.

A

SECURITY INSPECTION

56
Q

✓ Is one has been so published to the office that all concerned personnel are usually aware of its eminence and may consequently, make such preparations as are necessary.

A
  1. ANNOUNCEDSECURITY INSPECTION
57
Q

✓ It is an inspection whose imminence is known only to certain selected personnel,
normally the office head and intelligence personnel of the office to be inspected. It is
usually conducted during non – duty hour periods.

A
  1. UNANNOUNCED SECURITY INSPECTION
58
Q

✓ It is an inspection conducted in such a manner that office personnel are not aware
that such action is taking place.

A
  1. PENETRATION SECURITY INSPECTION
59
Q

✓ It is an inspection conducted in such a manner that office personnel are not aware
that such action is taking place.

A
  1. PENETRATION SECURITY INSPECTION
60
Q

✓ A planned and organized determination of facts concerning specific loss or damage of
assets due to threats, hazards or unsecured conditions.

A

SECURITY INVESTIGATION

61
Q

✓ They are any persons who offers or renders personal service to watch or secure either residential or business establishment, or both, or any building, compound, or area,
including, but not limited to, logging concessions, agricultural mining or pasture lands, for hire or compensation, or as an employee thereof, including any employee of the national or local government or any agency or instrumentality

A

SECURITY GUARDS

62
Q

✓ A security guard recruited and employed by the company.

A
  1. Company Security
63
Q

✓ A security guard hired by client belonging to private security agency.

A
  1. Private Security
64
Q

✓ A security guard recruited and employed by the government.

A
  1. GovernmentSecurity
65
Q

✓ Any person, association, partnership, firm or private corporation, who/which recruits,
trains, furnishes, or employs any watchman or security guard, or solicits individual,
business firm, private, public or government-owned or controlled corporation to engage his/its watchmen or security guards.

A
  1. Private Security Agency
66
Q

✓ It is a security force maintained and operated by any private company/corporation for its own security requirements.

A
  1. Company Security Force
67
Q

✓ A common a lightly visible type of security officer is the private security guards, who
is usually in uniform and is sometimes armed. Premises may be guarded twentyfour hours a day, seven days a week; only during the day; only during the night; or
only during peak periods, such as when sporting events are being conducted.

A
  1. Security Guards
68
Q

✓ Popular television series have glamorized the vocation of private detectives, but in
reality, today criminal investigation is only a small part of private detective’s work. Most
investigation conducted by security personnel concentrate on such matters as
background checks for employment, insurance, and credit applications.

A
  1. Private Detectives
69
Q

✓ Most private security courier services are armored cars, vans, or trucks, but they may
use airlines and trains as well. The security officers are uniformed and armed to
assure the protection of money, goods, documents, or people as they are transported from one location to another.

A
  1. Armored Vehicle Escorts
70
Q

the job includes the implementation of a viable security
education program which will sell security measures to the customer-clientele of the private security. It is also a must to improve the knowledge, and adopt an open mind regarding the many faceted problems involved in industrial security management.

A
  1. Security Supervisors
71
Q

✓ As private security expands and becomes professionalized, the need for expertise on security problems also expands. This expansion has given rise to variety of specialists, who provide consultation in areas such as electronic surveillance, protective lighting, fencing, and barricading; alarm systems; access control; key control; and security training.

A
  1. SecurityConsultants
72
Q

are any persons who are not a member of a regular police agency or the Armed
Forces of the Philippines who does detective work for hire, reward, or commission.

A

PRIVATEDETECTIVES