Part 5 Flashcards

1
Q

second aspect of security which is considered as the most important.

A

personnel security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The simple reason is that security involves people, and assets to be protected as a source of security threats.
It is an acknowledged fact that losses are attributed to negligence or active participation of employees, either thief or sabotage.
This emphasizes the need to set up a system of hiring the people for the company.

A

Personnel security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PURPOSE OF PERSONNEL SECURITY

A

To ensure that a firm hires those employees best suited for the firm; and
Once hired, to assist in providing the necessary security to these employees while they are carrying out their functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SCOPE OF PERSONNEL SECURITY

A

Personnel Security Investigation (PSI)
Security Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

process of inquiry into the character, reputation, discretion, integrity, morals and loyalty of an individual to determine the suitability for appointment or access to classified matter.

A

Personnel Security Investigation (PSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GENERAL TECHNIQUES OF PSI
1. BACKGROUND INVESTIGATION

A

This technique is very expensive but necessary in personnel security.
It serves to verify information on the application form and to obtain other information pertinent to decision to employ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FACTORS TO CONSIDER IN THE CONDUCT OF BACKGROUND INVESTIGATION:

A

Loyalty
Integrity
Discretion
Morals
Character
Reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The quality of faithfulness to the organization, superiors, subordinates and peers.

A

Loyalty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The uprightness of character, soundness of moral principles and truthfulness.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ability to act or decide with prudence, habit of wise judgment.

A

Discretion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The distinctive identifying qualities that serves as index to the essential nature of a

A

Morals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The sum of traits impressed by nature, education, and habit of a person.

A

Character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The opinion which one is generally held.

A

Reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Motives that cause people to be disloyal:

A

Revenge
Material Gain
Personal Prestige
Friendship
Ideological beliefs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TYPES OF LOCAL AGENCY CHECK (LAC)

A

Barangay Clearance
City/Municipal Clearance
Local Police Clearance
Court Clearance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TYPES OF NATIONAL AGENCY CHECK (NAC)

A

National Bureau of
Investigation
Clearance
PNP Directorate for Intelligence Clearance
Intelligence Service, AFP Clearance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is the process of inspecting or examining with careful thoroughness. The essence of vetting is a personal interview conducted under stress.
It is based on information previously given by the applicant. Other information is used during the interview, such as those discovered in the Bl which confirms or denies this given by the applicant.

A

POSITIVE VETTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is the process whereby a subject’s reaction in a future critical situation is predicted by observing his behavior, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test.

A

Profiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This is a process of using devices in detecting deception during the interview stage.
This includes the use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer.

A

Deception detection technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This type of investigation seeks to gather information on income and mode of living
Sometimes referred to as the earning-to- debt ratio.

A

FINANCIAL AND LIFESTYLE INQUIRY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is the placement of an agent in a role in which the agent’s true identity and role remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of asset losses.

A

Undercover investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This is a valuable tool because it gives departing employees an opportunity to list grievances.
It offers security managers an opportunity to learn of problems not previously known.

A

Exit interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It is conducted to develop security awareness among employees of the company. It should cover all employees, regardless of rank or position.

A

Security education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PHASES OF SECURITY EDUCATION

A

Security orientation
Security indoctrination
Security reminders
Security promotion
Security seminars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This consists of initial briefings made upon the new personnel and employees on security and its various aspects, and its importance.
They are also made aware of the security practices and procedures in the office or unit

A

Security orientation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

It aims to train all personnel so that each shall possess the skills and vigilance in the performance of their security responsibilities.
This security indoctrination program may take the form of lectures on appropriate subjects on security, showing of films bearing on security and other instructional devices.

A

Security indoctrination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This is a phase of a security education program which makes use of security posters, slogans, signs and stickers.
This is an indirect approach to inculcating security on the personnel and employees, but it does serve its purpose.

A

Security reminders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

This is another phase of the security education program which is a positive effort to sell security.
This may take various forms such as a personal recognition of a personnel who has done an effective security job. This personal recognition will go far in selling security to others.

A

Security promotion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Attending lectures on instructions and discussions on security will widen the personnel’s horizon, security wise, and probably make him more security conscious and disciplined.

A

Security seminars

30
Q

This involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure.

A

DOCUMENT AND INFORMATION SECURITY

31
Q

Any recorded information regardless of its physical form or characteristics, including but not limited to the following:
written matters whether handwritten, printed or typed;
all painted, drawn or engraved matters;
all sound and voice recordings,
all printed photographs and exposed or printed films, still or moving; and
All productions of the foregoing for whatever purpose.

A

Document

32
Q

➤ It includes all information concerning documents, cryptographic devices, developed projects and materials following on the categories of Top Secret, Secret, Confidential, and Restricted.

A

Classified information

33
Q

refers to the assigning of information or material, one of the four security categories after determination has been made that the information requires the security protection as provided.

A

Classify

34
Q

act of removing the security classification from classified information or matter.

A

Disclassify

35
Q

refers to the act of changing the assigned classification from classified information or matter.

A

Reclassify

36
Q

refers to the act of assigning the information or matter to the higher classification assigned to it. than that previously

A

Upgrading

37
Q

is the dissemination of classified information or matter to be limited strictly to those people whose duties require knowledge or possession thereof.

A

Need to know

38
Q

It refers to the grant of access to the classified matter only to properly cleared person when such classified information is required in the performance of their official duties.

A

Compartmentation

39
Q

This takes place through the loss of security which results from unauthorized persons obtaining knowledge of classified matters.

A

Compromise

40
Q

The process of destroying a document which is no longer significant in the organization.

A

Purging

41
Q

These are information that in some special way relates to the status or activities of the possessor and over which the possessor asserts ownership.
The information must have been developed by the company and not be available to the Government or to the public without restriction from another source.

A

PROPRIETARY INFORMATION

42
Q

It consist of any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage versus competitors who do not know or use it.
A trade secret is a process or device for continuous use in the protection of the business

A

Trade secrets

43
Q

This is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of 17 years.

A

Patents

44
Q

Is a word, phrase, symbol or design, or a combination of words, phrases, symbols or designs, that identifies and distinguishes the source of the goods of one party from those of others.

A

Trademark

45
Q

is a type of intellectual property that safeguards original works of authorship as soon as the author fixes the work in a tangible form of expression.

A

Copyright

46
Q

The certification by a responsible authority that the person described is cleared for access to classified matter at the appropriate level.

A

Security clearance certificate

47
Q

Two (2) types of Security Clearance

A

Final
Interim

48
Q

It is valid for five years unless sooner revoked by the issuing authority.

A

Final

49
Q

It is valid for two years unless sooner revoked by the issuing authority.

A

Interim

50
Q

What is the distinction between Relative Criticality and Relative Vulnerability?

A

Relative criticality
Relative vulnerability
Security hazards
Pilferage

51
Q

This pertains to the importance of the firm with reference to the natural economy and security.
Example is gasoline depots, communication transmission lines, and power plants.

A

Relative criticality

52
Q

This is the susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazards.
Example is the location of the building, the machines, or presence of possible poisons.

A

Relative vulnerability

53
Q

Any acts or conditions which may result in the compromise of information, loss of life, loss or destruction of property or disruption of the oblective of the installation.

A

Security hazards

54
Q

Act of stealing small things or items of little value, especially habitually.

A

Pilferage

55
Q

Two (2) Types of Pilferer

A

Casual pilferer
Systematic pilferer

56
Q

One who steals due to his inability to resist the unexpected opportunity and has little fear of detection.

A

Casual pilferer

57
Q

One who steals with preconceived plans and takes away any or all types of items or supplies for economic gain.

A

Systematic pilferer

58
Q

Intentional destruction or the deliberate damaging or destroying of property or equipment.

A

Sabotage

59
Q

The activity of spying or the use of spying or spies to gather secret information.
This is a hazard because people may come to know the confidential processes or procedures of a certain organization or business establishment.

A

Eapionage

60
Q

These are activities designed to overthrow the government or intended or likely to undermine or overthrow a government or other institutions.
It results in the disruption of the normal operations organization.

A

Subversive activities

61
Q

The basic instrument for determining security vulnerability.
Critical on-site examination and analysis of an industrial plant, business, a home or public or private institution done to ascertain the facility’s current security status.

A

Security survey

62
Q

Two (2) Types of Security Survey Conference

A

Entrance conference
Exit conference

63
Q

a dialogue between the survey team and the management, and officials of a plant before the security survey is conducted.

A

Entrance conference

64
Q

similar to the entrance conference, and it is done after the completion of the security survey.

A

Exit conference

65
Q

This is conducted to check on the degree of compliance with the recommended countermeasures and to determine the effectiveness and adequacy of the countermeasures which are in effect.

A

Security inspection

66
Q

Three (3) Specific Types of Security Inspection:

A

Announced security inspection
Unannounced security inspection
Penetration security inspection

67
Q

Is one has been so published to the office that all concerned personnel are usually aware of its eminence and may consequently, make such preparations as are necessary.

A

Announced security inspection

68
Q

It is an inspection whose imminence is known only to certain selected personnel, normally the office head and intelligence personnel of the office to be inspected.
It is usually conducted during non hour periods.

A

Unannounced security inspection

69
Q

It is an inspection conducted in such a manner that office personnel are not aware that such action is taking place.

A

Penetration security inspection

70
Q

A planned and organized determination of facts concerning specific loss or damage of assets due to threats, hazards or unsecured conditions

A

Security investigation