Part 5 Flashcards

(70 cards)

1
Q

second aspect of security which is considered as the most important.

A

personnel security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The simple reason is that security involves people, and assets to be protected as a source of security threats.
It is an acknowledged fact that losses are attributed to negligence or active participation of employees, either thief or sabotage.
This emphasizes the need to set up a system of hiring the people for the company.

A

Personnel security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PURPOSE OF PERSONNEL SECURITY

A

To ensure that a firm hires those employees best suited for the firm; and
Once hired, to assist in providing the necessary security to these employees while they are carrying out their functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SCOPE OF PERSONNEL SECURITY

A

Personnel Security Investigation (PSI)
Security Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

process of inquiry into the character, reputation, discretion, integrity, morals and loyalty of an individual to determine the suitability for appointment or access to classified matter.

A

Personnel Security Investigation (PSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GENERAL TECHNIQUES OF PSI
1. BACKGROUND INVESTIGATION

A

This technique is very expensive but necessary in personnel security.
It serves to verify information on the application form and to obtain other information pertinent to decision to employ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FACTORS TO CONSIDER IN THE CONDUCT OF BACKGROUND INVESTIGATION:

A

Loyalty
Integrity
Discretion
Morals
Character
Reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The quality of faithfulness to the organization, superiors, subordinates and peers.

A

Loyalty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The uprightness of character, soundness of moral principles and truthfulness.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ability to act or decide with prudence, habit of wise judgment.

A

Discretion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The distinctive identifying qualities that serves as index to the essential nature of a

A

Morals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The sum of traits impressed by nature, education, and habit of a person.

A

Character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The opinion which one is generally held.

A

Reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Motives that cause people to be disloyal:

A

Revenge
Material Gain
Personal Prestige
Friendship
Ideological beliefs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TYPES OF LOCAL AGENCY CHECK (LAC)

A

Barangay Clearance
City/Municipal Clearance
Local Police Clearance
Court Clearance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TYPES OF NATIONAL AGENCY CHECK (NAC)

A

National Bureau of
Investigation
Clearance
PNP Directorate for Intelligence Clearance
Intelligence Service, AFP Clearance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is the process of inspecting or examining with careful thoroughness. The essence of vetting is a personal interview conducted under stress.
It is based on information previously given by the applicant. Other information is used during the interview, such as those discovered in the Bl which confirms or denies this given by the applicant.

A

POSITIVE VETTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is the process whereby a subject’s reaction in a future critical situation is predicted by observing his behavior, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test.

A

Profiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This is a process of using devices in detecting deception during the interview stage.
This includes the use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer.

A

Deception detection technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This type of investigation seeks to gather information on income and mode of living
Sometimes referred to as the earning-to- debt ratio.

A

FINANCIAL AND LIFESTYLE INQUIRY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is the placement of an agent in a role in which the agent’s true identity and role remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of asset losses.

A

Undercover investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This is a valuable tool because it gives departing employees an opportunity to list grievances.
It offers security managers an opportunity to learn of problems not previously known.

A

Exit interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It is conducted to develop security awareness among employees of the company. It should cover all employees, regardless of rank or position.

A

Security education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PHASES OF SECURITY EDUCATION

A

Security orientation
Security indoctrination
Security reminders
Security promotion
Security seminars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
This consists of initial briefings made upon the new personnel and employees on security and its various aspects, and its importance. They are also made aware of the security practices and procedures in the office or unit
Security orientation
26
It aims to train all personnel so that each shall possess the skills and vigilance in the performance of their security responsibilities. This security indoctrination program may take the form of lectures on appropriate subjects on security, showing of films bearing on security and other instructional devices.
Security indoctrination
27
This is a phase of a security education program which makes use of security posters, slogans, signs and stickers. This is an indirect approach to inculcating security on the personnel and employees, but it does serve its purpose.
Security reminders
28
This is another phase of the security education program which is a positive effort to sell security. This may take various forms such as a personal recognition of a personnel who has done an effective security job. This personal recognition will go far in selling security to others.
Security promotion
29
Attending lectures on instructions and discussions on security will widen the personnel's horizon, security wise, and probably make him more security conscious and disciplined.
Security seminars
30
This involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure.
DOCUMENT AND INFORMATION SECURITY
31
Any recorded information regardless of its physical form or characteristics, including but not limited to the following: written matters whether handwritten, printed or typed; all painted, drawn or engraved matters; all sound and voice recordings, all printed photographs and exposed or printed films, still or moving; and All productions of the foregoing for whatever purpose.
Document
32
➤ It includes all information concerning documents, cryptographic devices, developed projects and materials following on the categories of Top Secret, Secret, Confidential, and Restricted.
Classified information
33
refers to the assigning of information or material, one of the four security categories after determination has been made that the information requires the security protection as provided.
Classify
34
act of removing the security classification from classified information or matter.
Disclassify
35
refers to the act of changing the assigned classification from classified information or matter.
Reclassify
36
refers to the act of assigning the information or matter to the higher classification assigned to it. than that previously
Upgrading
37
is the dissemination of classified information or matter to be limited strictly to those people whose duties require knowledge or possession thereof.
Need to know
38
It refers to the grant of access to the classified matter only to properly cleared person when such classified information is required in the performance of their official duties.
Compartmentation
39
This takes place through the loss of security which results from unauthorized persons obtaining knowledge of classified matters.
Compromise
40
The process of destroying a document which is no longer significant in the organization.
Purging
41
These are information that in some special way relates to the status or activities of the possessor and over which the possessor asserts ownership. The information must have been developed by the company and not be available to the Government or to the public without restriction from another source.
PROPRIETARY INFORMATION
42
It consist of any formula, pattern, device or compilation of information which is used in one's business and which gives him an opportunity to gain an advantage versus competitors who do not know or use it. A trade secret is a process or device for continuous use in the protection of the business
Trade secrets
43
This is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of 17 years.
Patents
44
Is a word, phrase, symbol or design, or a combination of words, phrases, symbols or designs, that identifies and distinguishes the source of the goods of one party from those of others.
Trademark
45
is a type of intellectual property that safeguards original works of authorship as soon as the author fixes the work in a tangible form of expression.
Copyright
46
The certification by a responsible authority that the person described is cleared for access to classified matter at the appropriate level.
Security clearance certificate
47
Two (2) types of Security Clearance
Final Interim
48
It is valid for five years unless sooner revoked by the issuing authority.
Final
49
It is valid for two years unless sooner revoked by the issuing authority.
Interim
50
What is the distinction between Relative Criticality and Relative Vulnerability?
Relative criticality Relative vulnerability Security hazards Pilferage
51
This pertains to the importance of the firm with reference to the natural economy and security. Example is gasoline depots, communication transmission lines, and power plants.
Relative criticality
52
This is the susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazards. Example is the location of the building, the machines, or presence of possible poisons.
Relative vulnerability
53
Any acts or conditions which may result in the compromise of information, loss of life, loss or destruction of property or disruption of the oblective of the installation.
Security hazards
54
Act of stealing small things or items of little value, especially habitually.
Pilferage
55
Two (2) Types of Pilferer
Casual pilferer Systematic pilferer
56
One who steals due to his inability to resist the unexpected opportunity and has little fear of detection.
Casual pilferer
57
One who steals with preconceived plans and takes away any or all types of items or supplies for economic gain.
Systematic pilferer
58
Intentional destruction or the deliberate damaging or destroying of property or equipment.
Sabotage
59
The activity of spying or the use of spying or spies to gather secret information. This is a hazard because people may come to know the confidential processes or procedures of a certain organization or business establishment.
Eapionage
60
These are activities designed to overthrow the government or intended or likely to undermine or overthrow a government or other institutions. It results in the disruption of the normal operations organization.
Subversive activities
61
The basic instrument for determining security vulnerability. Critical on-site examination and analysis of an industrial plant, business, a home or public or private institution done to ascertain the facility's current security status.
Security survey
62
Two (2) Types of Security Survey Conference
Entrance conference Exit conference
63
a dialogue between the survey team and the management, and officials of a plant before the security survey is conducted.
Entrance conference
64
similar to the entrance conference, and it is done after the completion of the security survey.
Exit conference
65
This is conducted to check on the degree of compliance with the recommended countermeasures and to determine the effectiveness and adequacy of the countermeasures which are in effect.
Security inspection
66
Three (3) Specific Types of Security Inspection:
Announced security inspection Unannounced security inspection Penetration security inspection
67
Is one has been so published to the office that all concerned personnel are usually aware of its eminence and may consequently, make such preparations as are necessary.
Announced security inspection
68
It is an inspection whose imminence is known only to certain selected personnel, normally the office head and intelligence personnel of the office to be inspected. It is usually conducted during non hour periods.
Unannounced security inspection
69
It is an inspection conducted in such a manner that office personnel are not aware that such action is taking place.
Penetration security inspection
70
A planned and organized determination of facts concerning specific loss or damage of assets due to threats, hazards or unsecured conditions
Security investigation