CHAPTER 2 Flashcards

(157 cards)

1
Q
  • The word secure is derived from the Latin
A

” secures” which means “safe” or “without care”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • The word secure is derived from se cura,
A

wherein se means “free from” and cura means “care.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

can be defined as the degree of protection or resistance against harm, danger, loss, and criminals.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pertaining to or engaged in industry.

A

INDUSTRIAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Skillful use of means to accomplish a purpose or the planning, deciding, or exercising of control and supervision on some functions of the organization.
A

MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • The business of providing security and protection to private individuals, business enterprises, or government and non – government industries
A

INDUSTRIAL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • The skillful handling of the security and safety measures of business enterprises and industrial establishments
A

INDUSTRIAL SECURITY MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • These are conditions or acts that may cause damage to property, injury, or loss of life.
A

HAZARDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • It is the broadest branch of security which is concerned with the physical measures adopted to prevent unauthorized access to equipment, facilities, materials, and documents, and to safeguard them against espionage, sabotage, damage and theft.
A

PHYSICAL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • This is a type of security applied to business groups engaged in industries like manufacturing, assembling research and development, processing, warehousing and even agriculture.
A

INDUSTRIAL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • A specialized type of physical security protecting the assets, personnel, and operation of a bank, with special emphasis on the precaution and measures to safeguard the cash and assets while the storage, in transit, and during transaction.
A

BANK SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • It refers to the protection of assets, guests, personal effects and other properties in hotels, inns, and other similar establishments.
A

HOTEL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • This involves the protection of personnel especially ranking officials from any harm, kidnap, and other acts.
A

V.I.P/PERSONAL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Protection of documents, classified papers and vital records from loss, access to unauthorized person, damage, theft and compromised, through proper storage and procedures.
A

DOCUMENT SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • It is the protection resulting from the application of various measures that prevent or delay the enemy or unauthorized persons in gaining information through the communication system.
A

COMMUNICATION SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • This is applied in response to the increase of violent crimes committed against students and school personnel, and school properties.
A

SCHOOL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • This is involved in the background checks of individuals commensurate with the security requirements of their work.
A

PERSONNEL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • This also includes measures designed to protect employees of an organization or business establishment.
A

PERSONNEL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • This is applied in response to the mushrooming of bazaars, marts, super malls, and the like.
A

SUPERMARKET SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • This is applied to minimize, if not prevent, losses of cargo during transit, storage or transfer.
A

AIRCARGO SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • This is a part of VIP security involved in hostage and kidnapping of VIP’s.
A

CRISIS SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • This is a type of security that deals primarily with the protection of processes, formula, patents and other industrial and manufacturing activities from espionage, infiltration, loss, compromise, or photocopying.
A

OPERATIONAL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • This includes every measure designed to safeguard company documents from unintentional or intentional harmful acts or against unauthorized disclosure of the information contained therein.
A

DOCUMENT AND INFORMATION SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

this division of security is applied to check the background of persons as well as the protection of company personnel against potentially harmful acts or conditions.

A

PERSONNEL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
covers other types of security to protect equipment, documents, facilities and materials against theft, damage, sabotage or espionage. It also encompasses protection of personnel from any criminal act.
PHYSICAL SECURITY
24
it can be defined as those measures taken to prevent physical access or entry to an installation or area by unauthorized personnel.
PHYSICAL SECURITY
25
* For the unfriendly government or organization, they are willing to devote enough time, money, personnel, materials, and imagination in passing barriers.
THERE IS NO IMPENETRABLE BARRIER
26
* In order that barrier could prevent unauthorized access and serve its purpose very well, there should be an integration of all barriers adopted in the installation.
DEFENSE IN DEPTH MEANS BARRIER AFTER BARRIER
27
* each installations will have different problems to overcome. * The security procedures will not be adequate for all installations.
EACH INSTALLATION IS DIFFERENT
28
* Refers to any physical structure whether natural or man-made capable of restricting, deterring, delaying or preventing illegal and unauthorized access to an installations
BARRIERS
28
is the greatest hazard from the standpoint of counter intelligence security because it is usually difficult to determine that the information has been compromised.
SURREPTITIOUS VERSUS NON – SURREPTITIOUS ENTRY
29
* Acquisition of information is the ultimate results, and the means and form in which the information is obtained.
ENEMY AGENTS MUST ACCESS
30
* These are offered by nature which could obstruct or delay the passageway of potential intruders.
NATURAL
31
* These are structural constructions like fences, walls, floors, roofs, grills, bars, roadblocks, or other physical means to deter or impede penetration.
MAN MADE
32
* Include mountains, cliffs, canyons, ravines, seas, marshes, deserts, or terrain difficult to traverse.
NATURAL BARRIERS
33
* Are those features constructed by man regardless of their original intent that tend to delay the intruder.
STRUCTURAL BARRIERS
34
* Include guards, charges of quarter’s office and shop workers, who stand between the intruder and the matter to be protected.
HUMAN BARRIERS
35
* Is a system designed to impede unauthorized external act such as simple intrusion to armed attack.
MINIMUM SECURITY
35
* Are usually electrical and electronic devices that could assist security personnel in detecting intrusions.
ENERGY BARRIERS
35
* Is a system designed to impede and detect some unauthorized external activity such as on small retail store, storage warehouses
LOW-LEVEL SECURITY
36
* Is designed to impede, detect and assess most unauthorized external and internal activities of certain prisons, defense contractors, pharmaceutical companies and sophisticated electronic manufacturers.
HIGH-LEVEL SECURITY
37
* Is designed to impede, detect and assess most external activity and some unauthorized internal activity that range from simple shoplifting to conspiracy to commit sabotage
MEDIUM SECURITY
38
* Coordination with local law enforcement agencies.
MAXIMUM SECURITY
39
A line or strip bounding or protecting an area.
PERIMETER
40
A medium or structures, which define the physical limits of an installation or area to restrict or impede access thereto. Any physical barrier used to supplement the protection of an inside perimeter.
PERIMETER BARRIER
41
A line protection surrounding but somewhat removed from the protected area, such as fence.
OUTSIDE PERIMETER
41
A line protection adjacent to protected area and passing through points of possible entry into the area. Ex: Doors, windows, tunnels
INSIDE PERIMETER
41
includes all perimeter barriers such as fences, bodies of water, gates, etc
1ST LINE DEFENSE
42
includes walls, doors, windows, roof, etc.
2ND LINE DEFENSE
43
includes those internal control measures specifically protective cabinets
3RD LINE DEFENSE
43
* Is a metallic container used for the safekeeping of documents or small items in an office or installations.
SAFE
44
can be classified as either robbery or burglary resistance depending upon the use and need.
SAFE
45
* Its weight must be at least 750 lbs, and should be anchored to a building structure. * Its body should at least one inch thick steel.
SAFE
46
* This is a heavily constructed fire and burglar resistance container usually a part of the building structure used to keep and protect cash, documents and negotiable documents.
VAULT
47
bigger than safe but smaller than a security file room.
VAULT
48
its door should be made of steel at least 6 inches in thickness.
VAULT
48
its walls, ceiling, floor reinforce concrete at least 12 inches in thickness and must be resistive up to 6 hours.
VAULT
48
* It is a cubicle in a building constructed a little higher than a vault but bigger size to accommodate limited people to work on the records inside.
FILE ROOM
49
* These provide access to areas within the perimeter barrier, and should be locked or guarded.
SIDEWALK ELEVATORS
50
it should at most be 12 feet high. It must have a watertight door and at least fire proof for one hour.
FILE ROOM
51
* An unobstructed area should be maintained on both sides of the perimeter barrier.
clear zone
52
* Made of opaque material in such a way that visual access through the fence structure is denied.
SOLID FENCES
53
are constructed with heavy materials such as bricks, stone and concrete, and usually extended down into the ground to a point of view below the front line.
SOLID FENCES
54
* Is constructed in such a manner that visual access is permitted such as wire fence, through the fence structure.
FULL VIEW FENCES
55
* It is designed purely to control physical access between two areas.
FULL VIEW FENCES
55
* It must be constructed of 7 feet of material excluding top guard. * It must be 9 gauges or heavier. * The mesh openings are not to be larger those 2 inches per side. * It should be twisted and barbed salvage at top and bottom. * It must be securely fastened to rigid metal or reinforced concrete. * It must reach within 2 inches of hard ground or paving.
CHAIN LINK FENCE
55
is twisted, double strand, 12 gauge wire with 4 point bars spaces in equal distance apart.
BARBED WIRE FENCE
56
is commercially manufactured wired coil of high strength steel barbed wire clipper together at intervals to form a cylinder.
* Standard concertina barbed wire
57
* An additional overhang or barbed wire placed on vertical perimeter fences facing upward and outward with a 45-degree angle with three to four strands of barbed wires spaced 6-inches apart and must be stalled on the supporting arms.
TOP GUARD
58
* Normally provided at main perimeter and entrance to secure areas located out of doors, and manned by guards on a full-time basis.
GUARD CONTROL STATIONS
59
* House-like structures above the perimeter barriers.
TOWERS OR GUARD TOWERS
60
* Should be erected where necessary in the management of unauthorized ingress, and preclude accidental entry. * It includes entry, ID, prohibited and exclusive areas signs.
SIGNS AND NOTICES OR CONTROL SIGNS
60
* Employed in augmenting the existing perimeter security or perimeter barriers of a certain establishment
PERIMETER GUARDS
61
* Security guards are assigned in a particular place of the compound to guard and watch the area surrounding.
FIXED POST
61
* In this system, the security guard is required to walk and go around regularly around the company premises.
PATROL (ROVING)
61
provides sufficient illumination during hours of darkness.
* Security lighting
62
is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the intruders.
PROTECTIVE LIGHTING
63
* Consisting of series of fixed luminaries to flood given area continuously overlap.
STATIONARY LUMINARY (CONTINUOUS)
64
* The intensity is focused to the intruder while the observer or guard remains in the comparative darkness.
GLARE PROJECTION TYPE
65
66
* The lighting is toward the approach of an entrance to an installation. Lights with reflectors increase glare.
GLARE PROJECTION TYPE
67
* The width of the lighted stop can be controlled and adjusted to suit the security needs.
CONTROLLED LIGHTING
68
* The lighting is focused; sag, on a file of items rather than on the background.
CONTROLLED LIGHTING
69
* Provides continuous lighting through manual operations.
STANDBY LIGHTING
70
* Common light bulbs in which light is produced by the resistance of a filament to electric current, have low initial cost and provide good color rendition.
INCANDESCENT LAMP
70
is turned on manually or by special device or other automatic means, when there is suspicion of entry.
STANDBY LIGHTING
71
* Emit a purplish white color caused by an electric current passing through a tube of conducting and luminous gas.
MERCURY VAPOR LAMPS
71
* Stationary or portable, manually operated searchlights which maybe lighted continuously during hours of darkness or only as needed, and usually supplementary to either to the first 2 types.
MOVABLE LIGHTING
72
* Duplicative of existing lighting system that is utilized in the event of electric failure.
EMERGENCY LIGHTING
73
* Considered more efficient and it is widespread in exterior lighting.
MERCURY VAPOR LAMPS
74
* Similar in physical appearance to mercury vapor, but provides a light source of higher luminous efficiency and better color rendition.
METAL HALIDE
74
* Provides good color rendition. * However, it cannot project light over long distances; thus, it is not desirable as flood lights.
FLUORESCENT LAMP
74
* Is introduced in 1965, for exterior lighting of parking areas, road ways, buildings, and industrial and commercial installations. * It emits golden to white to pink color.
HIGH PRESSURE SODUM VAPOR
75
* Produces yellow color.
LOW PRESSURE SODIUM VAPOR
76
* Produces very bright light.
QUARTZ LAMPS
77
* Project light in a concentrated beam use in boundaries and fences.
FLOODLIGHTS
78
* Highly focused incandescent lamps used to pinpoint potential trouble spots.
SEARCH LIGHTS
79
* Wide beam units, primary used to extend illumination in long, horizontal strips to protect approaches to perimeter barrier.
FRESNEL LIGHTS
80
* Type of protective alarm system where it located outside the installation.
CENTRAL STATION SYSTEM
81
* They are widely used in parking areas.
STREETLIGHTS
81
* It assists the security in detecting, impeding, or deterring potential security threat in the installation.
PROTECTIVE ALARMS
82
* It emits aural or visual signals or both.
SENSOR/TRIGGER DEVICE
82
* It is the signaling system that activates the alarm.
3. ANNUNCIATOR/ENUNCIATOR
83
* Its function is to alert the security personnel for any attempt of intrusion into a protected area, building or compound.
PROTECTIVE ALARMS
84
* A circuit which transmit the message to the signaling apparatus
TRANSMISSION LINE
85
* This function in the same way as central system except that it is owned by, operated and located in the facility.
PROPRIETY SYSTEM
86
* It can be located in an agency and the installation is one of the subscribers.
CENTRAL STATION SYSTEM
87
* These systems are used in residence or small retail establishments, which cannot afford a respond system.
LOCAL ALARM BY CHANCE
87
* The sensor detects any vibration caused by attempted forced entry
VIBRATION DETECTION DEVICE
88
* In this system installation circuits are led into local police or fire department by lease telephone lines.
AUXILIARY ALARM SYSTEM
88
* This system is set to call a predestined number when the alarm is activated. * The number selected might be the police or the subscriber’s home number, or both.
DIAL ALARM SYSTEM
88
* In building or compound, all point of entry can be wired by using electrically charge strips of tinfoil wire.
METALLIC FOIL OR WIRE
88
in which a bell or siren is sounded with no predictable response.
LOCAL ALARM BY CHANCE
89
* This system consist of ringing up visual or audible alarm near the object to be protected.
LOCAL ALARM
90
* It is usually placed in the teller’s cash drawer and connected to the alarm system using a wire connector.
BILL TRAPS
91
* Commonly found in location where personnel usually perform their duties from a seated position.
KNEE OR THIGH BUTTON
91
* Pressure is required on both side of the device and therefore the probability of accidental alarm is reduced.
DOUBLE SQUEEZE BUTTON
91
* It is connected by a wire to a control station and when an intruder crosses the beam he makes contact with the photo electronic coil which thus activates the alarm.
PHOTOELECTRIC EYE DEVICE
92
* A laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a physical object, an alarm is activated.
LASER BEAM ALARM
92
* It is activated by placing the front of their foot to engage the activation bar placed on the floor in such a position that tellers may activate the alarm.
FOOT RAIL ACTIVATOR
93
* A mechanical, electrical, hydraulic, or electronic device designed to prevent entry into a building, room, and container or hiding place and to prevent the removal of items without the consent of the owner.
LOCK
94
* A term in England for lock picker, safecracker, and penetrators of restricted areas or rooms.
PETERMAN
95
* They are used in safe deposit boxes and are for all practical purposes, pick proof. The least of these locks are used in desks, lockers and cabinets and generally less secure that pin tumbler lock.
LEVER TUMBLER LOCKS
95
* Portable and detachable lock having or sliding hasp that passes through a staple ring or the like.
PAD LOCKS
95
* Known as wafer locks. Used in car doors
DISC TUMBLER LOCKS
96
* Offer very little security, used only to provide privacy
WARDED LOCKS
96
* Are difficult to defeat, since they cannot be picked because few experts can manipulate the device to discover the combination.
COMBINATION LOCKS
97
* Are combination type locks and that no key is used.
CODE OPERATED LOCKS
97
* Are devices holding the door by magnetism.
ELECTROMAGNETIC LOCKS
98
* A key to a single lock within a master keyed system. * A specific key, which operates the lock and has a particular combination of cuts, or batting, which matches the arrangement of the tumblers in the lock.
CHANGE KEY
98
* A special key capable of opening a series of locks.
MASTER KEY
98
* Are electronically or more usually magnetic.
CARD OPERATED LOCKS
99
* A key will open all lock within a particular area or grouping in a given facility.
SUB – MASTER KEY
100
* A key that will open everything in a system involving two or more master key groups.
GRAND MASTER KEY
101
* All locks operated by change key. Grand Master Key and Great Grand Master Keys. * Used in great large complex system similar to three levels
GREAT GRAND MASTER KEY
102
* All locks operated by change key, grand master key, great grand master key and great great grand master key. Examples; big universities, complexes, large industrial complex.
GREAT GREAT GRAND MASTER KEY
103
* The issue of key to open the main entrance and the office.
MAISON KEYING
103
* Some administrative means must be set up to record code numbers and indicates to whom keys to specific locks have been issued.
KEY RECORD
104
* The cabinet will have to be sufficient size to hold the original key to every lock in the system. It should be secured at all times.
KEY CABINET
105
* Periodic inventories will have to be made of all duplicate and original keys in the hands of the employees whom they have been issued.
INVENTORIES
106
* In addition to periodic inventory, an unannounced audit should be made of all key control records and procedures by a member of management.
AUDITS
107
* should be made to the person responsible for key control from the personnel department indicating all persons who have left or will be leaving the company. * In the event that a key has been issued, steps should be initiated to insure that the key is recovered.
DAILY REPORT
108
is issued by security for personnel to be admitted in the installation. This system precludes those visitors with escorts and personnel in the access list.
PASS AND BADGE SYSTEM
108
the use of identification cards, passes, passwords, etc.
* Artificial Recognition
109
* An authenticated list of personnel given to security personnel’s allowing them to gain entry to a compound or installation or part thereof.
ACCESS LIST
109
* This helps security personnel eliminate the risk of allowing the access of unauthorized personnel within the establishments.
PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL
109
* This is to insure that only those persons who have the right and authority will give necessary access to the area.
PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL
110
* A system for personnel movement and control whereby badges or identification are issued to personnel upon entering an installation.
BADGE SYSTEM
110
* The pass or badge is coded for authorization to enter specific areas, it is issued to an employee until his authorization is terminated.
SINGLE PASS SYSTEM
111
is issued for permission to enter differing in specific areas by letters, numerals or colors.
* Pass
111
* The system should have a complete record of all badges and identification cards issued, return, mutilated or lost by serial number and cross indexed alphabetically.
BADGE AND PASS CONTROL
112
* An exchange takes place at the entrance of each controlled area. * Upon leaving the personnel surrenders his badge or passes and retrieve back his basic identification.
PASS EXCHANGE SYSTEM
113
* This provides an extra measure of security by requiring that an exchange take place at the entrance of each restricted area.
MULTI PASS SYSTEM
114
* Extreme caution must be exercised in areas where classified information is displayed to preclude unauthorized taking of pictures of the installation.
PHOTOGRAPH
114
* If there is a long delay or time lapse between the departure and arrival, the visitors may be required to show cause for the delay.
TIME TRAVELED
114
* Security should establish proper methods of establishing the authority for admissions of visitors as well as the limitation. * This security measure would depend on the sensitivity of the installation,
VISITORS MOVEMENT CONTROL
114
* All visitors to any facility should be required to identify themselves and should be given a visitor’s ID by the security. It should be filled up with the name of visitors, nature and duration of visit.
VISITOR’S LOGBOOK