Lecture 11 Flashcards

1
Q

the potential for an unwanted outcome resulting from an incident, event, or occurrence

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a natural or manmade occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

three components of risk to consider are:

A

threat
vulnerability
consequence (impact)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

physical features or operational attributes that render an entity open to exploitation or susceptible to a given hazard

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

freedom from fear or danger, defense against crime, protection of property of all kinds from loss through theft, fraud, fires, threats, or hazards

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

security threats

A

access & security control threats
criminal & terrorists threats
workplace violence threats
information & cyber threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

typical access controls

A

identification checks such as biometrics
identification cards/key control
verification of materials, products delivered
database of employee-owned vehicles and protocols for investigating illegally-parked cars
limited access by contractors, vendors, or other employees
training for personnel in recognizing suspicious packages/mails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

can be venues for criminal or terrorist activities

A

hotels, banks, grocery stores, manufacturing plants, nonprofit organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

suspicious behaviors

A

nervous behavior, evasive attitudes, or undue concern with privacy by guests or visitors
attempts to gain access to restricted areas
individuals taking notes, pictures, or videos of the facility without permission from the management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

abandoned vehicles may be used to

A

hide suspicious or stolen items, or worse, they could be a vehicle-borne improvised explosive device containing explosives for terrorist act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

examples of changes in vehicle patterns

A

a second mail delivery
idle delivery truck
bus on a different route
vehicle circling or going around the building numerous times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is an unlawful or unauthorized acquisition by force or stealth

A

theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

in an event of a bomb threat call:

A
  1. keep calm and keep the caller on the line
  2. get as many information as you can about the bomb and the caller (pay attention to background noises)
  3. immediately after caller hangs up, report threat to security or call emergency number
  4. follow evacuation procedure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

theft is done by

A

an insider (member or staff)
an outsider (someone who is not a company employee)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is an unlawful or unauthorized acquisition by fraud or deceit

A

diversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

internal conspiracies

A

employees not in appropriate work spaces at appropriate time
excessive contact with outside personnel
parking violations
“can you do me a favor?”

14
Q

do not just “snap” but display behavioral indicators over longer periods of time

A

potentially violent employees

15
Q

indicators of potentially violent behavior by an employee

A

depression and/or withdrawal
repeated violations of company policies
explosive outbursts of anger or rage without provocation
behavior that may include paranoia (“everybody is against me”)
escalation of domestic problems into the workplace
talk of severe financial problems
talk of previous incidents of violence

16
Q

other types of information or intellectual property

A

copyrights
trademarks
patents
industrial design rights
trade secrets

16
Q

common cyber threats and vulnerabilities include

A

active threats
system threats
passive threats

16
Q

passive threats such as

A

natural hazards
power failures
software glitches
human error

16
Q

active threats such as

A

hackers
cyber software
malicious code
information gathering
identity theft

16
Q

system threats such as

A

peer-to-peer software
loss of removable media

16
Q

basic components of security management system: may be conducted by security provider

A

threats and vulnerability assessment

17
basic components of security management system: perimeter barriers, lightings, CCTVs
physical security
18
basic components of security management system: IDs, records/log books, locks & keys, frisking/locker inspection
physical access controls
19
basic components of security management system: background check, pre-employment verification
personnel security
20
basic components of security management system: pre-entry/pre-exit inspection
container security
21
basic components of security management system: receiving/shipping procedures
procedural security
22
basic components of security management system: material gate pass, inspections
materials/company property security
23
basic components of security management system: restrictions/access controls, transaction recording
storage facility/warehouse security
24
basic components of security management system: secured IP, restriction of external drives, passwords, NDA
information and cyber security
25
basic components of security management system: background checks, barracks inspection
contractor security
26
basic components of security management system: monitoring, inspection, controls, recordkeeping
waste disposal/storage security
27
basic components of security management system: audits, spot inspections, procedure review
security management system review
28
basic components of security management system
1. threat and vulnerability assessment 2. physical security 3. physical access controls 4. personnel security 5. container security 6. procedural security 7. materials/company property security 8. storage facility/warehouse security 9. information and cyber security 10. contractor security 11. waste disposal/storage security 12. security & threat awareness training 13. security incident reporting and investigation 14. security management records/documentation 15. security management system review
29
the effect of an event, incident, or occurrence such as public health and safety, economic, psychological, and governance impacts
Consequence