Notes From Study Group Flashcards

0
Q

Way of estimating expected loss from a specific threat

A

Risk analysis / risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the five tools that form the foundation of a loss prevention program?

A
  1. Risk analysis/risk assessment
  2. Planning
  3. Evaluation
  4. Research based on scientific principles
  5. Standards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Determines the probability / frequency / cost

A

Loss event profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Typing risks, their probability, and degree of protection

A

Loss event profiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Probability of risks becoming actual loss

A

Loss event probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Impact on the enterprise if the loss occurs

A

Loss event criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the five tools that form the foundation of loss prevention program is critical for success?

A

Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four D’s of loss prevention?

A

Deter, detect, delay, and deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary objective of the protection program?

A

To motivate every employee to be part of the team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the most effective deterrent to shoplifting?

A

Well-trained store personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CPTED

A

Crime prevention through environmental design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three elements of CPTED?

A
  1. Natural access
  2. Natural surveillance
  3. Barriers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three roles of the loss prevention manager?

A
  1. Establish priorities
  2. Develop written policies
  3. Form integrated management team
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of security?

A

Service, protection service of prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who said, “value is better measured by what does not happen then by what does happen.”

A

Sennewald

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the five security levels?

A
  1. Minimum
  2. Low
  3. Medium
  4. High
  5. Maximum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the most important document for officers?

A

Post orders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the most important operational document?

A

The security log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is this the advantage of contract personnel or proprietary personnel?
Monetary savings

A

Contract personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Is this the advantage of contract personnel or proprietary personnel?
Tighter control of force

A

Proprietary personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Is this the advantage of contract personnel or proprietary personnel?
Schedule flexibility

A

Contract personnel

21
Q

Is this the advantage of contract personnel or proprietary personnel?
Better training

A

Proprietary personnel

22
Q

Is this the advantage of contract personnel or proprietary personnel?
Expertise

A

Contract personnel

23
Q

Is this the advantage of contract personnel or proprietary personnel?
Employee loyalty

A

Proprietary personnel

24
Q

Is this the advantage of contract personnel or proprietary personnel?
Security experience of officers

A

Contact personnel

25
Q

Is this the advantage of contract personnel or proprietary personnel?
Knowledge of company culture

A

Proprietary personnel

26
Q

Establishes a priority in the protection of assets

A

Vulnerability study

27
Q

Exposure to possible loss, reduction through loss prevention programs resulting in lessening of business interruptions

A

Risk management

28
Q

Critical examination/analysis of the present security status of a property in terms of deficiencies/excesses, protection required, and recommendations

A

Risk management concept

29
Q

What are the two types of risk?

A

Pure and dynamic

30
Q

This risk has no potential for benefit such as an earthquake

A

Pure risk

31
Q

This risk can produce gain or or profit such as Las Vegas

A

Dynamic risk

32
Q

Identifies types of risks/losses, and their probabilities of occurrence

A

Risk exposure

33
Q

Risk assessment determining the probability and cost of potential loss

A

Risk analysis

34
Q

What are the two types of vulnerability?

A

PML and ALE

35
Q

PML

A

Probable Maximum Loss (likely to sustain) or Possible Maximum Loss (destroyed)

36
Q

ALE

A

Annualized Loss Expectancy of not doing something (like adding a backup generator)

37
Q

When is ALE used?

A

When computing return on investment

38
Q

Reduction of risk

A

Risk abatement

39
Q

The organization accepts the loss

A

Risk acceptance

40
Q

The decision to avoid risks

A

Risk avoidance

41
Q

Reducing the likelihood of total loss such as discs being stored off site

A

Risk spreading

42
Q

Transferring risk to insurance

A

Risk transfer

43
Q

Assures trustworthiness of persons appointed by the court

A

Fiduciary bonds

44
Q

Insurance Company indemnifies the employer against employee dishonesty

A

Fidelity Bond

45
Q

Protects against another’s failure to perform specified acts on time

A

Surety bond

46
Q

Protects an individual/ organization against losses of a specified type

A

Indemnity bond

47
Q

What is the most investigated crime by private security?

A

Employee theft

48
Q

What are the four reasons employees steal?

A
  1. Frustration
  2. Rationalization
  3. Personal problems
  4. Environmental influences
49
Q

What is the theft triangle?

A

Motive, opportunity and desire/rationalization

50
Q

What is the only controllable element in the theft triangle?

A

Opportunity