Lecture 11 Flashcards

1
Q

the potential for an unwanted outcome resulting from an incident, event, or occurrence

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a natural or manmade occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

three components of risk to consider are:

A

threat
vulnerability
consequence (impact)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

physical features or operational attributes that render an entity open to exploitation or susceptible to a given hazard

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

freedom from fear or danger, defense against crime, protection of property of all kinds from loss through theft, fraud, fires, threats, or hazards

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

security threats

A

access & security control threats
criminal & terrorists threats
workplace violence threats
information & cyber threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

typical access controls

A

identification checks such as biometrics
identification cards/key control
verification of materials, products delivered
database of employee-owned vehicles and protocols for investigating illegally-parked cars
limited access by contractors, vendors, or other employees
training for personnel in recognizing suspicious packages/mails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

can be venues for criminal or terrorist activities

A

hotels, banks, grocery stores, manufacturing plants, nonprofit organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

suspicious behaviors

A

nervous behavior, evasive attitudes, or undue concern with privacy by guests or visitors
attempts to gain access to restricted areas
individuals taking notes, pictures, or videos of the facility without permission from the management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

abandoned vehicles may be used to

A

hide suspicious or stolen items, or worse, they could be a vehicle-borne improvised explosive device containing explosives for terrorist act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

examples of changes in vehicle patterns

A

a second mail delivery
idle delivery truck
bus on a different route
vehicle circling or going around the building numerous times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is an unlawful or unauthorized acquisition by force or stealth

A

theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

in an event of a bomb threat call:

A
  1. keep calm and keep the caller on the line
  2. get as many information as you can about the bomb and the caller (pay attention to background noises)
  3. immediately after caller hangs up, report threat to security or call emergency number
  4. follow evacuation procedure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

theft is done by

A

an insider (member or staff)
an outsider (someone who is not a company employee)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is an unlawful or unauthorized acquisition by fraud or deceit

A

diversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

internal conspiracies

A

employees not in appropriate work spaces at appropriate time
excessive contact with outside personnel
parking violations
“can you do me a favor?”

14
Q

do not just “snap” but display behavioral indicators over longer periods of time

A

potentially violent employees

15
Q

indicators of potentially violent behavior by an employee

A

depression and/or withdrawal
repeated violations of company policies
explosive outbursts of anger or rage without provocation
behavior that may include paranoia (“everybody is against me”)
escalation of domestic problems into the workplace
talk of severe financial problems
talk of previous incidents of violence

16
Q

other types of information or intellectual property

A

copyrights
trademarks
patents
industrial design rights
trade secrets

16
Q

common cyber threats and vulnerabilities include

A

active threats
system threats
passive threats

16
Q

passive threats such as

A

natural hazards
power failures
software glitches
human error

16
Q

active threats such as

A

hackers
cyber software
malicious code
information gathering
identity theft

16
Q

system threats such as

A

peer-to-peer software
loss of removable media

16
Q

basic components of security management system: may be conducted by security provider

A

threats and vulnerability assessment

17
Q

basic components of security management system: perimeter barriers, lightings, CCTVs

A

physical security

18
Q

basic components of security management system: IDs, records/log books, locks & keys, frisking/locker inspection

A

physical access controls

19
Q

basic components of security management system: background check, pre-employment verification

A

personnel security

20
Q

basic components of security management system: pre-entry/pre-exit inspection

A

container security

21
Q

basic components of security management system: receiving/shipping procedures

A

procedural security

22
Q

basic components of security management system: material gate pass, inspections

A

materials/company property security

23
Q

basic components of security management system: restrictions/access controls, transaction recording

A

storage facility/warehouse security

24
Q

basic components of security management system: secured IP, restriction of external drives, passwords, NDA

A

information and cyber security

25
Q

basic components of security management system: background checks, barracks inspection

A

contractor security

26
Q

basic components of security management system: monitoring, inspection, controls, recordkeeping

A

waste disposal/storage security

27
Q

basic components of security management system: audits, spot inspections, procedure review

A

security management system review

28
Q

basic components of security management system

A
  1. threat and vulnerability assessment
  2. physical security
  3. physical access controls
  4. personnel security
  5. container security
  6. procedural security
  7. materials/company property security
  8. storage facility/warehouse security
  9. information and cyber security
  10. contractor security
  11. waste disposal/storage security
  12. security & threat awareness training
  13. security incident reporting and investigation
  14. security management records/documentation
  15. security management system review
29
Q

the effect of an event, incident, or occurrence such as public health and safety, economic, psychological, and governance impacts

A

Consequence