Lecture 11 Flashcards
the potential for an unwanted outcome resulting from an incident, event, or occurrence
Risk
a natural or manmade occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property
threat
three components of risk to consider are:
threat
vulnerability
consequence (impact)
physical features or operational attributes that render an entity open to exploitation or susceptible to a given hazard
Vulnerability
freedom from fear or danger, defense against crime, protection of property of all kinds from loss through theft, fraud, fires, threats, or hazards
security
security threats
access & security control threats
criminal & terrorists threats
workplace violence threats
information & cyber threats
typical access controls
identification checks such as biometrics
identification cards/key control
verification of materials, products delivered
database of employee-owned vehicles and protocols for investigating illegally-parked cars
limited access by contractors, vendors, or other employees
training for personnel in recognizing suspicious packages/mails
can be venues for criminal or terrorist activities
hotels, banks, grocery stores, manufacturing plants, nonprofit organizations
suspicious behaviors
nervous behavior, evasive attitudes, or undue concern with privacy by guests or visitors
attempts to gain access to restricted areas
individuals taking notes, pictures, or videos of the facility without permission from the management
abandoned vehicles may be used to
hide suspicious or stolen items, or worse, they could be a vehicle-borne improvised explosive device containing explosives for terrorist act
examples of changes in vehicle patterns
a second mail delivery
idle delivery truck
bus on a different route
vehicle circling or going around the building numerous times
is an unlawful or unauthorized acquisition by force or stealth
theft
in an event of a bomb threat call:
- keep calm and keep the caller on the line
- get as many information as you can about the bomb and the caller (pay attention to background noises)
- immediately after caller hangs up, report threat to security or call emergency number
- follow evacuation procedure
theft is done by
an insider (member or staff)
an outsider (someone who is not a company employee)
is an unlawful or unauthorized acquisition by fraud or deceit
diversion