456 Flashcards

(78 cards)

1
Q

✓The second aspects of security is personnel security which is considered as the most
important.
✓The simple reason, is that security involves people and assets to be protected as source
of security threats.
✓It is an acknowledge fact that losses are attributed to negligence or active participation of
employees, either thief or sabotage

A

Personnel Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A process of inquiry into the character, reputation, discretion, integrity, morals and loyalty
of an individual to determine the suitability for appointment or access to classified matter.

A

Personnel Security Investigation (PSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

-This technique is very expensive but necessary in personnel security.
-It serves to verify information on the application form and to obtain other
information pertinent to decision to employ

A

Background Investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The quality of faithfulness to the organization, superiors,
subordinates and peers.

A

Loyalty-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The uprightness of character, soundness of moral principles and
truthfulness.

A

Integrity-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ability to act or decide with prudence; habit of wise
judgment

A

Discretion-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The distinctive identifying qualities that serves as index to the
essential nature of a person

A

Morals-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The sum of traits impressed by nature, education, and habit of a
person

A

Character-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The opinion which one is generally held

A

Reputation-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is the process of inspecting or examining with careful thoroughness

A

Positive Vetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the process whereby a subject’s reaction in a future critical situation is
predicted by observing his behavior, or by interviewing him, or analyzing his responses to a
questionnaire, such as honesty test.

A

Profiling-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a process of using devices in detecting deception during the interview stage.

A

Deception Detection Technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

-This type of investigation seeks to gather information on income and mode of living.
-Sometimes referred to as the earning-to-debt ration

A

Financial and Lifestyle Inquiry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is the placement of an agent in a role in which the
agent’s true identity and role remains unknown, in order to obtain information for criminal
prosecution or for recovery or limitation of asset losses.

A

Undercover Investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

-This is a valuable tool because it gives departing employees an opportunity to list
grievances.
-It offers security managers an opportunity to learn of problems not previously known.

A

Exit Interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is conducted to develop security awareness among employees of the company. It
should cover all employees, regardless of rank or position.

A

Security Education?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

-This consists of initial briefings made upon the new personnel and employees
on security and its various aspects, and its importance.
-They are also made aware of the security practices and procedures in the office
or unit

A

Security Orientation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

-It aims to train all personnel so that each shall possess the skills and vigilance
in the performance of their security responsibilities.
-This security indoctrination program may take the form of lectures on
appropriate subjects on security, showing of films bearing on security and other
instructional devices.

A

Security Indoctrination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This is a phase of security education program which makes use of security
poster, slogans, signs and stickers.
✓This is an indirect approach to inculcating security on the personnel and
employees, but it does serve its purpose.

A

Security Reminder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is another phase of security education program which is a positive effort
to sell security.
✓This may take various forms such as a personal recognition on a personnel
who has done an effective security job. This personal recognition will go far in
selling security to others.

A

Security Promotion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Attending lectures on instructions and discussions on
security will widen the personnel’s horizon, security wise, and probably make
him more security conscious and disciplined.

A

Security Seminars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

-This involves the protection of documents and classified papers from loss, access by
unauthorized persons, damage, theft and compromise through disclosure.

A

Document and Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It includes all information concerning document, cryptographic
devices developed projects and materials following on the categories of Top Secret,
Secret, Confidential and Restricted.(sensitive information)

A

Classified Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This refers to the assigning of information or material, one of the four security
categories after determination has been made that the information requires the security
protection as provided.

A

Classify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The act of removing the security classification from classified information or matter.
Declassify
26
It refers to the act of changing the assigned classification from classified information or matter.
Reclassify
27
It refers to the act of assigning the information or matter to the higher classification than that previously assigned to it.
Upgrading
28
It is the dissemination of classified information or matter to be limited strictly to those people whose duties requires knowledge or possession thereof.
Need to know –
29
refers to the grant of access to the classified matter only to properly cleared person when such classified information is required in the performance of their official duties.
Compartmentation
30
This takes place through the loss of security which results from unauthorized persons obtaining knowledge of classified matters.
Compromise
31
The process of destroying a document which is no longer significant in the organization.
Purging
32
-It consist of any formula, pattern, device compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage versus competitors who do not know or use it.
Trade secrets
33
This is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of 17 years
Patent
34
is a word, phrase, symbol or design, or a combination of words, phrases, symbols or designs, that identifies and distinguishes the source of the goods of one party from those of others
Trademarks
35
a type of intellectual property that safeguards original works of authorship as soon as the author fixes the work in a tangible form of expression.
Copyright
36
This pertains to the importance of the firm with reference to the natural economy and security
Relative Criticality
37
This is the susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazards.
Relative Vulnerability
38
Act of stealing small things or items of little value, especially habitually
PILFERAGE
39
any acts or conditions which may result in the compromise of information, loss of life, loss of destruction of property or disruption of the objective of the installation.
SECURITY HAZARDS
40
one who steals due to his inability to resist the unexpected opportunity and has little fear of detection
Casual Pilferer-
41
one who steals with preconceived plans and takes away any or all types of items or supplies for economic gain.
Systematic Pilferer
42
Intentional destruction or the deliberate damaging or destroying of property or equipment.
SABOTAGE
43
activity of spying or the use of spying or spies to gather secret information
ESPIONAGE
44
These are activities designed to overthrow the government or intended or likely to undermine or overthrow a government or other institutions.
SUBVERSIVE ACTIVITIES
45
-The basic instrument for determining security vulnerability
SECURITY SURVEY
46
-A planned and organized determination of facts concerning specific loss or damage of assets due to threats, hazards or unsecured conditions.
SECURITY INVESTIGATION
47
is a dialogue between the survey team and the management and officials of a plant before the security survey is conducted.
Entrance conference
48
similar to entrance conference, and it is done after the completion of the security survey.
Exit Conference
49
This is conducted to check on the degree of compliance with the recommended countermeasures and to determine the effectiveness and adequacy of the countermeasures which are in effect
SECURITY INSPECTION
50
A mechanical, electrical, hydraulic, or electronic device designed to prevent entry into a building, room and container or hiding place and to prevent the removal of items without the consent of the owner
Lock-
51
Portable and detachable lock having or sliding hasp that passes through a staple ring or the like.
Pad lock-
52
also called a ward lock) is a type of lock that uses a set of obstructions, or wards, to prevent the lock from opening unless the correct key is inserted. (old lock and common sa mga baul)
Warded Locks
53
a lock composed of fitted rotating detainer discs. -Known as wafer locks
Disc Tumbler Locks
54
they are used in safe deposit boxes and are for all practical purposes, pick proof.
Lever Tumbler Locks
55
s a type of locking device in which a sequence of symbols, usually numbers, is used to open the lock. (parang password/pincode)
Combination Locks-
56
are combination type locks and that no key is used. -Also known as digital locks are keyless for extra security
Code Operated Locks
57
a device that is used to operate a lock.
Key
58
A key to a single lock within a master keyed system. A specific key, which operates the lock and has a particular combination of cuts, or batting, which matches the arrangement of the tumblers in the lock.( may specific lock lang na pwede nitong buksan)
Change Key-
59
A key will open all lock within a particular area or grouping in a given facility.
Sub-master key
60
A special key capable of opening a series of locks
Master Key
61
A key that will open everything in a system involving two or more master key groups
Grand master key
62
all locks operated by change key
Great Grand Master Key
63
the issue of key to open the main entrance and the office.
Maison Keying
64
a well constructed cabinet will have to be procured. The cabinet will have to be sufficient size to hold the original key to every lock in the system. It should be secured at all times.
Key Cabinet-
65
some administrative means must be set up to record code numbers and indicates to whom keys to specific locks have been issued.
Key Record-
66
periodic inventories will have to be made of all duplicate and original keys in the hands of the employees whom they have been issued.
Inventories-
67
addition to periodic inventory, an unannounced audit should be made of all key control records and procedures by a member of management.
Audits-
68
a daily report should be made to the person responsible for key control from the personnel department indicating all persons who have left or will be leaving the company. In the event that a key has been issued, steps should be initiated to ensure that the key is recovered.
Daily Report
69
issued by security for personnel to be admitted in the installation. This system precludes those visitors with escorts and personnel in the access list.
PASS AND BADGE SYSTEM
70
an authenticated list of personnel given to security personnel’s allowing them to gain entry to a compound or installation or part thereof.
Access List-
71
a system for personnel movement and control whereby badges or identification are issued to personnel upon entering an installation. Visitors are issued also issued temporary badges when entering the installation.
Badge System
72
the pass or badge is coded for authorization to enter specific areas, it is issued to an employee until his authorization is terminated.
Single Pass System
73
an exchange takes place at the entrance of each controlled area.
Pass Exchange System
74
This provides an extra measure of security by requiring that an exchange take place at the entrance of each restricted area
Multiple Pass System
75
It refers to an area in which personnel or vehicles are controlled for reasons of security. ✓ It is established to provide security for installation or facilities and to promote efficiency of security operations and economy in the use of security personnel.
Restricted area
76
Are those areas access is restricted as to entrance or movement by all unauthorized personnel and vehicles.
Controlled Areas
77
Are those within the controlled area where a greater degree of security is required.
Limited Areas
78
Are used only for handling and storage of high value cargo and classified documents. ✓ The number of people authorized to enter this area should be strictly limited, and the area should be always under surveillance. ✓ CCTV Control Room/Finance Area is a form of exclusion area.
Exclusion Areas