Print Study Guide Flashcards
5 forces that shape assets protection
Technology and touch
Convergence of security solutions
Globalization in business
The international security environment
Standards and regulations
Unity of command
Should only report to one person
5 categories of distinction between public and private policing
Philosophical
Legal
Financial
Operational
Security/political
Is accumulated depreciation an asset or liability
Asset
What is gross profit margin based on
Sales and cost of goods sold (efficiency of producing product)
What is operating margin based on
EBITA
What is the quick ratio
Aka acid test, aka cash ratio (easily converted to cash)
What is WAECUP?
Waste, accidents, error, crime, unethical practices
Used as blueprint for developing security objectives
What is the STEP model
Social, technological, environmental, and political
Potential sources of threats
What is a corrective report
Alerts units with unacceptable incident records
What is a misconduct investigation?
Employee or affiliate violates policy or law
What are compliance investigations for
Violations of law, lapses in business ethics, and concomitant legal sanctions
Pygmalion effect
If you believe someone is capable of achieving greatness, they will
What is “mens rea”
“guilty mind”, the state of mind or wrongful purpose required by criminal laws; must be acting intentionally (except negligence or strict liability crimes)
What % of evidence is typically testimonial
80%
Any building opening less than ___ feet above the ground should be secured
18
A clear zone of ___ feet or more should separate the primer barrier from structures within the protected area
50
What is the most common intrusion detector?
Passive infrared sensors
Where should acoustic glass break sensors be placed
On the opposite wall
What law prohibits the use of unlicensed microphones for purposes of eavesdropping?
The federal communications act
Containers rated for fire and theft have a 1-2 hour fire rating and a TL rating of ___
30
At a minimum, how often should lock combinations be changed?
Every 1-2 years
What is the least secure frequency range because it contains fm bands
88-120
What is Angel dust the street name for
PCP
First responder vs emergency responder
Emergency responder could be staff
What is organization resilience management?
Systematic and coordinated activities and practices through which and organization manages its operational risks and the associated potential threats and impacts therein
This evaluates the presence of any specific concerns of violence affecting the workplace and the organizations readiness to respond to threats and violent incidents
Needs assessment
For workplace violence, these employees may be the first to be notified of an incident, a victim, or unsafe conditions.
Occupational safety and health personnel
An unstable condition involving an impending abrupt or significant change that requires urgent attention and action to protect life, assets, property, or the environment
Crisis
Serious, unexpected, and precarious situation requiring immediate action
Emergency
These prescription drugs are most subject to abuse in the workplace.
Stimulants and sedatives
Top two drugs abused in the workplace (in order)
Alcohol then marijuana
What is the layered security called in EP?
Rings of protection
The person under protection
The principal
The person paying for the security/protection
The client
Manages, designs, or manipulates the environment in a systematic way to increase the necessary effort and risk while reducing perceived rewards to the potential offender
Situational crime prevention
What is PAP
Physical asset protection
An event that causes significant damage to assets or loss of life
Disaster
Difference between IAP (information asset protection) vs ISS (information systems security)
IAP is holistic, ISS is digital
What is the AAA triad in confidentiality of information?
Authentication, authorization, and auditing
What is cyclical redundancy check
A tool for maintaining integrity of information which shows if data has been altered
What is the body of knowledge required for certification as an information system security professional
Critical information systems security professional (CISSP)
PCI DSS - PG 269
What are the two most prominent management system standards
ISO 9001 on quality management systems
ISO 14001 on environmental management systems
ISO 22301 on business continuity
What are the two most prominent management system standards
ISO 9001 on quality management systems
ISO 14001 on environmental management systems
What are the five categories of distinction between public and private policing?
Philosophical
Legal
Financial
Operational
Security/political
What is ANSI?
American national standards institute
What are the two types of civil law?
Common (case) and statutory
What is GSA
General services administration
What comprises the CISSP body of knowledge (8 ISS domains)
Security and risk management
Asset security
Security engineering
Communications and network security
Identity and access management (IAM)
security assessment and testing
Security operations
Software development security
What is the payment card industry data security standard (PCI DSS)
Standards to protect credit card data
What is the gramm-leach-bliley act
Regulates the use and disclosure of non-public personal information about individuals who obtain financial products or services from financial institutions
Sarbanes oxley act (SOX)
The most significant law since SEC; PLACES SUBSTANTIAL ADDITIONAL RESPONSIBILITIES ON OFFICERS AND DIRECTORS OF PUBLIC COMPANIES AND IMPOSES SIGNIFICANT CRIMINAL PENALTIES ON CEOS CFOS AND OTHERS WHO VIOLATE ITS PROVISIONS
What is the red flags rule?
Regulates financial institutions for early detection and prevention of theft; identify patterns, procedures to detect, respond, and update program regularly
Federal Trades commission (FTC) “safeguards rule”
Financial institutions must have comprehensive information security program
What is the general data protection regulation (GDPR)?
EU law on data protection and privacy; gives individuals control over their data
What is the EU-US privacy shield framework
Since US doesn’t have adequate data protection, allows companies to be designated as having adequate protection.