Industrial Security Management Flashcards

1
Q

, which was adopted by the United Nations on 10 December 1948, guarantees such instinct to protect in Article 3, which states that “Everyone has the right to life, liberty and security of person”

A

The Universal Declaration of Human Rights,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

lays the foundation that protects the Filipino citizens’ right to security

A

1987 Constitution of the Republic of the Philippines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The prime duty of the Government is to serve and protect the people. The Government may call upon the people to defend the State and, in the fulfillment thereof, all citizens may be required, under conditions provided by law, to render personal, military or civil service.

A

Section 4, Article II.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

No person shall be deprived of life, liberty, or property without due process of law, nor shall any person be denied the equal protection of the laws.

A

Section 1, Article III.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This section provides that all qualified citizens of the state, including security personnel, may be required by law to render personal military or civil service.

A

section 4 article II

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This section provides that due process of law should be observed all the time. It is unlawful to deprive a person his life or property without undergoing proper inquiry, trial or even judgment.

A

section 1 article III

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The right of the people to be secure in the persons, houses, papers, and effects against unreasonable searches and seizures of whatever nature and for any purpose shall be inviolable, and no search warrant or warrant of arrest shall issue except upon probable cause to be determined personally by the judge after examination under oath or affirmation of the complainant and the witnesses he may produce, and particularly describing the place to be searched and the persons or things to be seized.

A

Section 2, Article III.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Private property shall not be taken for public use without just compensation.

A

Section 9, Article III.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Congress shall not, except by general law, provide for the formation, organization, or regulation of private corporations.

A

Section 16, Article XII.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In this particular law, the security guards, watchmen, private detectives and the security officers are considered as force multipliers of the Philippine National Police (PNP) because of the role they play in times of disaster or calamities.

A

Republic Act No. 5487 or “An Act to Regulate the Organization and Operation of Private Detective, Watchmen or Security Guards Agencies,”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“An Act to Regulate the Organization and Operation of Private Detective, Watchmen or Security Guards Agencies,”

A

Republic Act No. 5487

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

“An Act to Regulate the Organization and Operation of Private Detective, Watchmen or Security Guards Agencies,”

A

Republic Act No. 5487

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

refers to a logical set of tangible elements and measures adopted to prevent unauthorized access to equipment, facilities, materials, documents and personnel.

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Selection of safeguards can be influenced by the nature of the site such as the size, layout, utilities, internal activities and assets in the site. Other factors may include company philosophy and workforce culture.

A

Site Characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This refers to the area surrounding the facility.

A

Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Also, at play in the selection of safeguards are the environment climate, weather, and natural forces.

A

3.Forces of Nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

patterns must be considered in selecting the necessary countermeasures. Decisions should be preceded by a risk assessment that includes a study on the nature, intensity, and repetitiveness of criminal acts that have occurred in or near the facility during the recent past.

A

Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is a natural or manufactured obstacle to the movement of persons, animals, vehicles or materials. It defines physical limits to and delays or prevents penetration of an area

A

A barrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PURPOSE OF PHYSICAL BARRIERS

A

1.To control the movement of people and vehicles into, out of, and within the facility.
2.To segregate or compartmentalize sensitive areas.
3.To provide physical protection to objects, materials, and processes of critical nature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

include bodies of water, mountains, marshes, ravines, deserts or other terrain that are difficult to cross.

A

1.Natural Barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

are man-made barriers such as fences, walls, floors, roofs, grills, bars, roadblocks or other physical means. A—physically and psychologically deters or discourages the undetermined, delays the determined and channels the flow of authorized traffic through entrances.

A

2.Structural Barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is the key element in a y security system. Without it, all other perspective devices – mechanical, electrical or electronic – would be useless

A

.Human Barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

like river, lakes, marsh, ponds or other bodies of water forming part of the wall, building or fencing should never be considered adequate natural perimeter barrier.

A

Bodies of water

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

usually has sheathing placed over the rafters, often horizontal wooden boards placed flush on the rafters.

A

The roof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

may be similarly constructed, with sheathing placed diagonally on vertical studs and covered with sheathing paper. This is usually topped with an exterior material such as stucco, or siding composed of overlapping horizontal boards or vinyl siding.

A

Exterior walls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

are utilized to support structural loads, or are used as curtain walls to enclose spaces between load-bearing walls, but are not normally designed to prevent or delay penetration.

A

concrete structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This surface may then be covered with building paper and flooring such as tile, cork, rubber, linoleum, or wood.

A

floor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Must be constructed of 7-foot material excluding top guard.
Must be of 9-gauge or heavier.
Mesh openings are not to be larger than 2 inches per side.

A

1.1Chain Link Fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Standard barbed wire is twisted, double-strand, 12-gauge wire with 4-point barbs spaced at an equal distance apart.
Must be less than seven feet high, excluding top guard.
Must be firmly affixed to post not more than six feet apart.
The distance between strands must not exceed 6-inches and at least one wire will be interlaced vertically and midway between posts.

A

1.2Barbed Wire Fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

is commercially manufactured wire coil of high strength steel barbed wire clipped together at intervals to form a cylinder.
Opened concertina wire is 50 feet long and 3 feet diameter.

A

1.3Concertina Wire Fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

of 20 feet or more should exist between the perimeter barrier and exterior structure, parking areas and natural or man-made features.

A

A clear zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

5 wire fences

A

chain link fence
barbe wired fence
concertina wire fence
top guard
clear zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

their combination serve also as barriers and must be of such construction to provide uniform protection just like the wire fencing.

A

building walls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

may be covered with acoustic or decorative tile. It is a common modern building technique to construct a ceiling plenum that do not have security barriers between rooms and areas.

A

Ceilings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

They are usually fastened by hinges to the door jamb on one side and equipped with a latch and perhaps a lock on the other side.

A

personnel doorways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

They may be hinged on the outside on jamb edges and secured with a locking device where the inner edges of the doors meet in the center. Sliding or rolling doors, single or double, may also be used. They may move horizontally or vertically on tracks or rollers. Folding doors that fold in hinged sections are another option.

A

vehicular doorway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

are designed to provide ventilation, natural illumination or visual access through a wall, or any combination of the three

A

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

is the easiest line of defense inside a facility. It is the simplest ways to impose a physical restraint as well as grant entry.

A

locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

It is the most widely used physical security device, yet it is hardly foolproof. However, – can also be vulnerable to physical force.

A

locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

are commonly used in apartment buildings and condominiums. They are typically located outside the building, with a panel, handset and touchpad.

A

Telephone entry systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Controlled entry into a business usually begins with the identification of the person entering. The identity of employees or visitors can be determined through the following types of identification verification and access control.

A

Identification Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

installed indoors or outdoors complement and supplement physical barriers. These systems are designed to alert security personnel to completed or attempted intrusion into an area, building or compound.

A

protective alarm sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Types of protective alarm system include (4)

A

local alarm system, auxiliary system, central station system and proprietary system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

is designed to illuminate the perimeter barrier and the outside approaches of an area.

A

Protective lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

produces bright white light with its intensity focused on the intruder who is made highly visible but unable to easily see what lies ahead.

A

glare projection type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

is focused on certain objects than the background.

A

Controlled lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

provides continuous illumination of a protected area during the hours of darkness, but it can be turned on manually or by special device or other automatic means.

A

standby lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

can be stationary or portable and consists of manually operated searchlights. It may be lighted continuously hours of darkness or only as needed.

A

Movable lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

is a standby lighting that can be utilized in the event of electric failure, either due to local equipment or commercial power failure.

A

Emergency lighting

50
Q

types of protective lights

A

stationary luminary
standby lightning
movable lightning
emergengy lightning

51
Q

to be completed by job applicants requires them to provide all relevant information and confirm its correctness with a signature.

A

application form

52
Q

is a critical measure in the screening process. In fact, other measures in the screening process should only come second after the applicant’s identity has been satisfactorily proven

A

IDENTITY VERIFICATION

53
Q
  • Individuals like crooks, terrorists or wanted criminals may wish to remain anonymous or undetected.
A

To avoid detection

54
Q

This involves individuals who have ill intentions to commit credit fraud or unqualified applicants who falsify educational qualifications to obtain employment.

A

For dishonest financial gain -

55
Q
  • This includes individuals who have failed to pay debts and are avoiding financial liabilities.
A

To avoid financial liability

56
Q

such as passports by using false ‘breeder’ documents (ie. those documents required to obtain passports, such as birth certificates which can have few or no security features).

A

To legally obtain genuine documents -

57
Q

involves requesting original documents such as those that corroborate the applicant’s full name, signature, date of birth and full permanent address.

A

paper-based approach,

58
Q

involves checking the applicant’s personal details against external databases. This method requires checking and cross-referencing information from databases such as criminal records or credit reference agencies. v

A

electronic approach

59
Q

involves the verification of information regarding educational or professional qualifications

A

A qualification check

60
Q

involves the verification of the applicant’s employment history in terms of dates of employment and position.

A

employment check

60
Q

involves the verification of the applicant’s employment history in terms of dates of employment and position.

A

employment check

61
Q

is to help the employer in evaluating the candidate’s reliability and integrity. It also helps to discover whether applicants are hiding negative information such as a criminal record or dismissal from previous employment for suspicious reasons.

A

qualifications and previous employment

62
Q

involve the evaluation of an individual based their online reputation. It includes searching for what they say or what others say about them on the internet.

A

Media searches

63
Q

is a system of policies and procedures that manages the risk of staff or contractors exploiting legitimate access to an organization’s assets or premises for unauthorized purposes.

A

Personnel security

64
Q

An employee who leaves an organization could possibly have considerable knowledge about its assets, operations and security vulnerabilities. If the reason for the employee’s departure is not amicable, he might maliciously give sensitive information to the organization’s competitor.

A

EXIT PROCEDURES

65
Q

is done with employees about to leave the company in order to help identify problems contributing to employee turnover.

A

the exit interview

66
Q

an irreplaceable record, reproduction of which does not have the same value as the original.

A

Class I - Vital Document -

67
Q
  • a record, reproduction of which will involve considerable expense and labor or considerable delay.
A

Class II - Important Document

68
Q

 - a record, the loss of which may cause inconvenience but could be readily replaced and may not present an insurmountable obstacle to the prompt restoration of the business.

A

Class III - Useful Document

69
Q
  • a record that may include daily files, routine in nature, the loss of which will not affect the organization’s operation.
A

Class IV - Non-essential Document

70
Q

During this stage, information is discovered and developed. Information can take the form of handwritten notes, discussion, dictated script, or electronic data. It is commonly concentrated in laboratories, offices, word processing units and computer centers.

A

1.Creation -

71
Q

During this stage, information is discovered and developed. Information can take the form of handwritten notes, discussion, dictated script, or electronic data. It is commonly concentrated in laboratories, offices, word processing units and computer centers.

A

1.Creation -

72
Q

Undoubtedly, information is created for use. This stage involves a process wherein people act on the information for the purpose of making a decision based on the information, soliciting support or informing others.

A

use

73
Q

Used information should be put away for future use. —- methods must ensure the integrity of the information, its timely accessibility to authorized users, and its protection from criminal intervention and disastrous circumstances.

A

3.Storage and Retrieval -

74
Q

This involves the transfer of information from active to inactive storage. Inactive records are usually located in remote areas less accessible to users.

A

Transfer -

75
Q

This is the last stage of the cycle of information. During this stage, a decision can be made to retain the information indefinitely at either an active or inactive storage center or to dispose of it.

A

Disposition -

76
Q

It is unlike other business resources age, but it tends not to diminish; today’s breaking for instance, because it can easily expand to cover a wider scope.

A

Information is expansive.

77
Q

Just a decade ago, information assets were stored in computer systems with electronic barriers inside centrally controlled equipment and located within the protected confines of a computer room.

A

Information requires barriers.

78
Q

Organizations should protect information assets because it is costly to acquire and maintain, and it is important to the success of the business enterprise. In industries like research and development, education and publishing, information fuels their business. It has significant value in much the same sense that people, physical property and financial assets have value.

A

Information is costly and important.

79
Q

When something has value, someone will want an opportunity to take it away.

A

Information is coveted.

80
Q

. At some point in time, certain information can lose all or most of its value.

A

Information has a limited life

81
Q

In a world of advanced information technology, several employees may hold and share sensitive corporate information on their laptops, memory drives and emails.

A

Information is difficult to protect.

82
Q

Another reality is that companies are dealing in larger volumes of information than ever before. Great amounts of raw data are needed to make fully developed analyses.

A

Information is voluminous.

83
Q

refers to information that has value and should be protected

A

sensitive information

84
Q

This is information the unauthorized disclosure of which could cause serious damage to the organization’s business. Its use and access to it are strictly limited.

A

SECRET -

85
Q

This is information of such value or sensitivity that is unauthorized disclosure could have a substantially detrimental effect on the organization’s business.

A

RESTRICTED –

86
Q

This is information relating to employees.

A

PRIVATE –

87
Q

includes intellectual properties that are recognized and granted varying degrees of protection by governments,

A

Proprietary information

88
Q

grants issued by a national government conferring the right to exclude others from making, using, or selling the invention within that country.

A

PATENTS –

89
Q

words, names, symbols, devices, or combinations thereof used by manufacturers or merchants to differentiate their goods and distinguish them from products that are manufactured or sold by others.

A

TRADEMARKS –

90
Q

protections given by a national government to creators of original literary, dramatic, musical, and certain other intellectual works.

A

COPYRIGHTS –

91
Q

– formulas, patterns, compilations, programs, devices, methods, techniques, and processes that derive economic value from not being generally known and not ascertainable except by illegal means.

A

TRADE SECRETS

92
Q

securus which means

A

“safe” or “without care,”

93
Q

se cura,

A

wherein se means “free from” and cura means “care.”

94
Q

can be defined as the degree of protection or resistance against harm, danger, loss, and criminals.

A

Security

95
Q

is anything tangible or intangible that is capable of being owned or controlled to produce value.

A

An asset

96
Q

is the uncertainty of financial loss, the probability that a loss has occurred or will occur, the variations between actual and expected results, or the possible occurrence of an undesirable event. The end result of risk is loss or a decrease in value

A

Risk

97
Q

is anything that could adversely affect assets; it can be classified into natural hazards (such as floods), accidents (chemical spills), or intentional acts (domestic or international terrorism)

A

A threat

98
Q

means weakness, flaw, or virtually anything that may conceivably be exploited by a threat

A

Vulnerability

99
Q

pertains to all physical barriers employed or installed to secure assets.

A

Physical Security -

100
Q

refers to the procedure followed, inquiries conducted, and criteria applied to determine the work suitability of a particular applicant or the retention of a particular employee.

A

Personnel Security -

101
Q

refers to policies, regulations, doctrines, and practices enforced to safeguard the contents and integrity of any classified information or document from compromise or loss.

A

.Document and Information Security -

102
Q

is another category that relate to social relationships involving governments or entities that hold authority or power.

A

Political security

103
Q

refers to the way governments are ensuring the protection of its citizens, organizations and institutions against threats to their well-being, as well as maintaining the general security and pence in public places.

A

Public security

104
Q

is the requirement to maintain the survival of a state through the use of economic power, diplomacy, and political power

A

National security

105
Q

consists of the measures taken by nations and international organizations to ensure mutual survival and safety.

A

International security

106
Q

is a form of physical security involving industrial plants and business enterprises.

A

Industrial security

107
Q

involves the protection resulting from the application of various measures which safeguards cash and assets in storage, in transit, or during transaction.

A

Bank and armor security

108
Q

nvolves using various measures of protection for the guests, personnel properties and functions in hotels, restaurants, bars and clubs.

A

Hotel security

109
Q

involves the protection of top-ranking official of the government, visiting persons of illustrious standing and foreign dignitaries.

A

.V.I.P. security

110
Q

involves the protection of processes, formula, patents and industrial and manufacturing activities from espionage, infiltration, loss, compromise or infringement.

A

Operational security

111
Q

involves the safeguard resulting from the application of different measures which prevent or delay the enemy or unauthorized person from gaining information through communication including transmission and cryptographic.
7.Mall/commercial security is the degree of protection against danger, loss, and crime inside malls. As a form of protection, it refers to systems, structures and processes that provide or improve mall security as a condition.

A

.Communication security

112
Q

is the degree of protection against danger, loss, and crime inside malls. As a form of protection, it refers to systems, structures and processes that provide or improve mall security as a condition.

A

Mall/commercial security

113
Q

the —- of the ancient period were the ones who organized who organized the first police force in the city states which they termed —

A

The Greeks
polis

114
Q

on the other hand, established the Praetorian Guards known as — who were tasked to be fire fighters

A

The Romans,
vigils

115
Q

In the Middle Ages during their invasion of England, the —— formed a group of carefully selected men called shires or sheriff to look after the peace and order of the different regions.

A

french

116
Q

In —-,—— set up in England and Wales a police force that operated to capture and punish criminals.

A

1655
Oliver Cromwell

117
Q

In –, London magistrate —– introduced the concept of crime prevention by organizing citizen patrols or watchmen that not only chased criminals for felony and misdemeanor but also served Fielding ‘s purpose of preventing crime ahead of time with their patrolling function.

A

1748
Henry Fielding

118
Q

he formed the first formal police department.

A

English Home Secretary Sir Robert Peel

119
Q

The —— government introduced the Guardia Civil in the Philippines in 1868 to serve as the police force based on the Civil Guard of Spain. They performed patrol functions in cities and towns, organized operations for the suppression of bandit groups, and imposed penalties for infringement of laws and local ordinances.

A

Spanish colonial