Revision Flashcards
The four characteristic principles involved in internal thefts scams include
diversion,
conversion,
disguise,
divergence.
Carlson identifies five specific categories of distinction between public and private policing:
Philosophical.
Legal.
Financial.
Operational.
Security/Political.
The foundation for any WPV program is the security risk assessment (or needs assessment) which should asses three elements:
the types of threats,
the types of threats,
vulnerabilities
consequences
A violence risk assessment program employs three characteristics:
diversion,
delay
response.
The 4 most distinctive and important elements of WPV are:
behavioral recognition,
notification,
assessment,
intervention.
Known subject assessment for WPV can be broken down into three levels of assessment:
initial,
threshold,
comprehensive.
Threat is a combination of 4 elements:
adversary capabilities,
equipment,
motivation or intent,
and likelihood of attack
The security manager should engineer the PPS by using the building blocks of three characteristics
people,
procedures,
technology
A type of systems approach for PPS follows three general steps:
Assessmentof vulnerability
assessment of vulnerability,
implementation of countermeasures,
evaluation of effectiveness.
A well-engineered PPS exhibits the following characteristics:
protection-in-depth
minimum consequence of component failure
balanced protection
CPTED is congruent with the security mission of three elements characteristics:
Deter
Detect
Delay
The three approaches to situational crime prevention Increasing the effort:
Increasing the risks
Reducing anticipated rewards
Removing excuses
Second generation CPTED employs four main strategies
Cohesion.
Capacity threshold.
Community culture.
Connectivity.
Three main characteristics of intrusion sensor performance are
probability of detection (PD)
probability of detection (PD),
nuisance alarm rate
vulnerability to defeat.
Can divide sensors into these clusters :
buried line,
fence-associated,
freestanding
Sensors may be grouped by three application:
Boundary-penetration sensors.
Interior motion sensors.
Proximity sensors.
Learning can be separated into three domains:
Cognitive learning (knowledge-based).
Affective learning (attitudinal)..
Psychomotor learning (physical skills).
Four elements of physical design, which are
Deterrence
Detection
Delay
response.
The three planning and assessment phase for security design:
identifying assets
identifying assets
considering vulnerabilities
assessing risk.
The complete set of procurement documents, known as contract (or bid) documents, will consist of three sections:
contractual details
construction specifications,
construction drawings.
If an organization discovers that its copyright has been violated, it is essential to take action immediately. Response tools include
hiring legal counsel;
informing the proper authorities;
conducting investigations, raids, and seizures
initiating civil litigation, administrative proceedings, and criminal prosecutions.
The following are key steps to take after an information loss:
Investigation
Damage Assessment
Recovery and Follow-up
When measuring the potential consequences of a loss of information phases should always considered:
Timing
time dependencies
project
Just as in other security disciplines, three other characteristics control objectives must be met for information security:
Detection
Recovery
compliance
As in other security disciplines, information systems countermeasures can be divided into three broad classifications:
control
administrative controls:
technical controls:
physical controls
Crisis Management objectives are three:
minimize the probability of a threat or emergency.
minimize.
mitigate .
recover
The four elements required for a bombing.
motive,
material,
knowledge,
opportunity
Threat evaluation is a complex management decision that requires preparation such as:
Procedures
Procedures
Planning
Training
rehearsal.
The fundamental principles when bombs threat occures are:
3
Identification
Investigation
Response