Notes From Study Group Flashcards

0
Q

Way of estimating expected loss from a specific threat

A

Risk analysis / risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the five tools that form the foundation of a loss prevention program?

A
  1. Risk analysis/risk assessment
  2. Planning
  3. Evaluation
  4. Research based on scientific principles
  5. Standards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Determines the probability / frequency / cost

A

Loss event profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Typing risks, their probability, and degree of protection

A

Loss event profiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Probability of risks becoming actual loss

A

Loss event probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Impact on the enterprise if the loss occurs

A

Loss event criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the five tools that form the foundation of loss prevention program is critical for success?

A

Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four D’s of loss prevention?

A

Deter, detect, delay, and deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary objective of the protection program?

A

To motivate every employee to be part of the team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the most effective deterrent to shoplifting?

A

Well-trained store personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CPTED

A

Crime prevention through environmental design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three elements of CPTED?

A
  1. Natural access
  2. Natural surveillance
  3. Barriers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three roles of the loss prevention manager?

A
  1. Establish priorities
  2. Develop written policies
  3. Form integrated management team
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of security?

A

Service, protection service of prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who said, “value is better measured by what does not happen then by what does happen.”

A

Sennewald

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the five security levels?

A
  1. Minimum
  2. Low
  3. Medium
  4. High
  5. Maximum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the most important document for officers?

A

Post orders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the most important operational document?

A

The security log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is this the advantage of contract personnel or proprietary personnel?
Monetary savings

A

Contract personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Is this the advantage of contract personnel or proprietary personnel?
Tighter control of force

A

Proprietary personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Is this the advantage of contract personnel or proprietary personnel?
Schedule flexibility

A

Contract personnel

21
Q

Is this the advantage of contract personnel or proprietary personnel?
Better training

A

Proprietary personnel

22
Q

Is this the advantage of contract personnel or proprietary personnel?
Expertise

A

Contract personnel

23
Q

Is this the advantage of contract personnel or proprietary personnel?
Employee loyalty

A

Proprietary personnel

24
Is this the advantage of contract personnel or proprietary personnel? Security experience of officers
Contact personnel
25
Is this the advantage of contract personnel or proprietary personnel? Knowledge of company culture
Proprietary personnel
26
Establishes a priority in the protection of assets
Vulnerability study
27
Exposure to possible loss, reduction through loss prevention programs resulting in lessening of business interruptions
Risk management
28
Critical examination/analysis of the present security status of a property in terms of deficiencies/excesses, protection required, and recommendations
Risk management concept
29
What are the two types of risk?
Pure and dynamic
30
This risk has no potential for benefit such as an earthquake
Pure risk
31
This risk can produce gain or or profit such as Las Vegas
Dynamic risk
32
Identifies types of risks/losses, and their probabilities of occurrence
Risk exposure
33
Risk assessment determining the probability and cost of potential loss
Risk analysis
34
What are the two types of vulnerability?
PML and ALE
35
PML
Probable Maximum Loss (likely to sustain) or Possible Maximum Loss (destroyed)
36
ALE
Annualized Loss Expectancy of not doing something (like adding a backup generator)
37
When is ALE used?
When computing return on investment
38
Reduction of risk
Risk abatement
39
The organization accepts the loss
Risk acceptance
40
The decision to avoid risks
Risk avoidance
41
Reducing the likelihood of total loss such as discs being stored off site
Risk spreading
42
Transferring risk to insurance
Risk transfer
43
Assures trustworthiness of persons appointed by the court
Fiduciary bonds
44
Insurance Company indemnifies the employer against employee dishonesty
Fidelity Bond
45
Protects against another's failure to perform specified acts on time
Surety bond
46
Protects an individual/ organization against losses of a specified type
Indemnity bond
47
What is the most investigated crime by private security?
Employee theft
48
What are the four reasons employees steal?
1. Frustration 2. Rationalization 3. Personal problems 4. Environmental influences
49
What is the theft triangle?
Motive, opportunity and desire/rationalization
50
What is the only controllable element in the theft triangle?
Opportunity