Term
|
Definition
pertains to building construction designs that increase safety, what organizations and employees can do in preparation for emergencies and what they can do once an emergency occurs |
|
|
Term
Fire Department prevention efforts |
|
Definition
Facility planning, pre-fire planning, public education, codes, inspections and legal implications |
|
|
Term
|
Definition
how to prevent a fire beforehand |
|
|
Term
|
Definition
applies personnel, equipment and other resources to fire |
|
|
Term
|
Definition
|
|
Term
Fire Prevention strategies |
|
Definition
Inspections, planning, safety, good house keeping, HAZMAT incidents, evacuation and medical services and training. |
|
|
Term
Fire suppression Strategies |
|
Definition
integrated systems, detection of smoke & fires, portable extinguishers, sprinklers, standpipes and hose reels, firewalls and doors and access control |
|
|
Term
|
Definition
accidents, bombthreats-explosions-terrorism, weapons of mass destruction, strikes, civil disturbance, sabotage, technological emergencies |
|
|
Term
|
Definition
windstorms, floods, blizzards, earthquakes and hurricanes |
|
|
Term
|
Definition
an outbreak of infectious disease that affect humans over a large geographic area |
|
|
Term
|
Definition
diseases tha are transmitted between animal and human |
|
|
Term
|
Definition
the condition of being safe from undergoing or causing hurt, injury or loss |
|
|
Term
|
Definition
an unfortunate even resulting from carelessness, ignorance,unawareness or a combination of losses |
|
|
Term
|
Definition
hurt damage or loss sustained |
|
|
Term
|
Definition
a dangerous condition, behavior or object that can cause accidnet, injury or death |
|
|
Term
What do worker compensation laws require? |
|
Definition
employers to compensate injured employees |
|
|
Term
Two primary cases of accidents |
|
Definition
unsafe conditions, unsafe acts by people |
|
|
Term
|
Definition
use of aggressive strategies to produce fear, coercion or violence for political, religious and criminal ends |
|
|
Term
Psychological factors of terrorism |
|
Definition
factors within an individual that influence terrorism |
|
|
Term
Structural causes of terrorism |
|
Definition
a repsonse to social-structural condition that groups are powerless to deal with through conventional political and military action |
|
|
Term
|
Definition
unlawful use of force or violence committed by a group or individuals who has a connection to foreign power or whose activities transcend national boundaries against persons or property to intimidate or coerce a government or population. |
|
|
Term
|
Definition
group working inside the US whose acts are directed at the US government and its people |
|
|
Term
Terrorist acts are classified in 5 catagories (BNICE) |
|
Definition
Biological,Nuclear, Incendiary,chemical and explosive |
|
|
Term
|
Definition
|
|
Term
|
Definition
bombs constructed from readily available material or the misappropriation of military or commercial blasting supplies |
|
|
Term
|
Definition
capable of inflicting mass causalities and destroy high value assets |
|
|
Term
|
Definition
human reactions and events surrounding the use of WMD's that may result in limited or no causalities or physical damage |
|
|
Term
7 methods to confront terrorism |
|
Definition
diplomacy, intelligence*, military*, financial*, law enforcement, homeland security, business organizational security. (* most important) |
|
|
Term
|
Definition
a concerted national effort to prevent terrorist attacks within the U.S., reduce America’s vulnerability to terrorism, and minimize the damage and recover from attacks that do occurs |
|
|
Term
The four fronts of the National Strategy for Combating Terrorism: |
|
Definition
Defeat, deny, diminish, defend |
|
|
Term
Homeland Security Advisory System |
|
Definition
was established to assist the Nation in remaining vigilant, prepared and ready to deter terrorist acts |
|
|
Term
5 levels of advisory system |
|
Definition
• Low condition (green)- low risk if attack • Guarded condition (blue)-general risk of attack • Elevated condition (yellow)- significant risk of attack • High condition (orange)- high risk of attack • Severe condition (red)- severe risk of attack |
|
|
Term
|
Definition
the system and assets, whether physical or virtual, so vital to the U.S. that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matter |
|
|
Term
|
Definition
publicly or privately controlled resources essential to the minimal operation of the economy and government |
|
|
Term
|
Definition
individual targets whose destruction could cause large-scale injury, death or destruction of property, and/or profoundly damage national prestige and confidence |
|
|
Term
Risk management framework includes the following activities: |
|
Definition
setting goals, identifying assets- systems- networks and functions, access risk, prioritize, implement protective programs, measure effectiveness |
|
|
Term
|
Definition
the use of natural agents in attacks on agriculture or directly on people |
|
|
Term
|
Definition
the deliberate introduction of a disease agent, either against livestock or into the food chain, to undermine socioeconomic stability and/or generate fear |
|
|
Term
|
Definition
consists of hardware or software that scrambles data, rendering it unintelligible to an unauthorized person intercepting it. |
|
|
Term
|
Definition
computers as a target, computers as an instrument, computers as incidental to crime, crimes associated with prevalence of computers |
|
|
Term
|
Definition
• Security is never foolproof • Even state-of-the-art security has its vulnerabilities • Security is often as good as the time it takes to get through it |
|
|
Term
Techniques of cybercriminals |
|
Definition
denial of service, trojan horse, viruses and worms,logic bomb, dumpster diving, spam, phishing, key logging, spyware, malware |
|
|
Term
|
Definition
is the amount of merchandise that has disappeared through theft, has become useless because of breakage or spoilage, or is unaccounted for because of sloppy recording |
|
|
Term
Personnel factors attributing to losses |
|
Definition
part-time or temporary worker, inexperienced workers, dissatisfied employees, high rate of turnover. |
|
|
Term
Some strategies to address the problem of internal loss are |
|
Definition
motivation, morale boosters and rewards, employee discounts, shopping services, undercover investigations |
|
|
Term
Other categories that contribute to internal losses are |
|
Definition
accidents, fire, unproductive employees(smokers), unintentional and intentional mistakes, excessive absenteeism and mistakes. |
|
|
Term
|
Definition
nothing more then a piece of paper until the money is being collected |
|
|
Term
|
Definition
the unlawful duplication of something valuable to deceive |
|
|
Term
|
Definition
amateurs, juveniles or students, easy access, drunk or vagrant, addict, professional, kleptos |
|
|
Term
Two prerequisites to an apprehension for shoplifting are |
|
Definition
Make sure to have seen the shoplifter conceal the stores merchandise. Never lose sight of the shoplifters |
|
|
Term
Store personnel can detain shoplifters with that type of force? |
|
Definition
|
|
Term
|
Definition
taking something from an individual bu for or threat of force |
|
|
Term
Robbery protection strategies |
|
Definition
alarms, CCTV, safes, bait money, security officers, armored car service. |
|
|
Term
|
Definition
the unlawful entry in a structure with intent to commit another crime |
|
|
Term
Retailers prevent burglaries by? |
|
Definition
hardening the target, creating time delay and reducing loot. |
|
|
Term
|
Definition
combined the Bank Protection Act of 1968 and the Bank Secrecy Act of 1986 into one document, which established minimum standards to combat robbery, burglary and larceny |
|
|
Term
The Antiterrorism and Effective Death Penalty Act of 1996 |
|
Definition
makes it a criminal offense for persons in the United States to engage in financial transaction with countries that condone or encourage terrorism |
|
|
Term
|
Definition
is an attempt to make “dirty” money appear clean |
|
|
Term
Types of crimes inherent on campuses? |
|
Definition
crimes against persons, theft of property, drug abuse and distribution, vandalism |
|
|
Term
Student right to know act of 1990 |
|
Definition
Requires crime awareness and prevention measures Requires reporting campus crime to the FBI Uniform Crime Reports program Requires making crime statistics available to students and the general public |
|
|
Term
In 1992, the Campus Sexual Assault Victim’s Bill of Rights amended this act |
|
Definition
Requires schools to develop policies to deal with sexual assault on campus Requires prompt action from schools |
|
|
Term
Security strategies for healthcare institutions |
|
Definition
Accountability and inventory control Auditing Applicant screening Access controls Patrols and CCTV Emergency room Newborn nursery Pharmacy Locker rooms Mortuary Patient property Protection of patient information |
|
|
Term
typical profile of the workplace violator includes the following characteristics |
|
Definition
Disgruntled, chronic complainer Predominately white Age in the late 30s to early 40s Does not take responsibility for their own shortcomings Is seen as a troublemaker Is very difficult to supervise Is a marginal performer Has an obsession with weapons May identify with notorious violent incidents They are defensive and suspicious, have a fragile ego They are chronically angry and are in constant turmoil |
|
|
Term
Some strategies for executive protection include |
|
Definition
Planning Education & training Avoidance of predictable patterns Recognition of tricks Protection at home Protection at the office Attacks while traveling Kidnap insurance |
|
|
Term
|
Definition
occurs when both hostages and abductors become empathetic toward each other the longer they are together. |
|
|
Term
|
Definition
Alcoholism (most abused drug in America) Narcotics Depressants Stimulants Hallucinogens Inhalants |
|
|
Term
Substance Abuse categories include |
|
Definition
Psychological dependence Addiction Tolerance Withdrawal |
|
|
Term
|
Definition
is proprietary information that, if obtained by an unauthorized person, destroyed in a disaster, or lost, can cause harm to an organization |
|
|
Term
|
Definition
a secret process that is used to produce a salable product |
|
|
Term
|
Definition
provides protection for an invention or design |
|
|
Term
|
Definition
includes words, symbols, logos, designs or slogans that identify products or services as coming from a common source |
|
|
Term
|
Definition
provides protection for original works by giving the creator or publisher exclusive rights to the work |
|
|
Term
|
Definition
internal attack, external attack, combined conspiracy |
|
|
Term
first step to keeping sensitive information secure? |
|
Definition
identify it and classify it among its value |
|
|
Term
communication security involves defense against interception and includes? |
|
Definition
line security, transmission security, emanation security(wireless), technical security |
|
|
Term
|
Definition
utilized electronic devices to covertly listen to conversations(legal) |
|
|
Term
|
Definition
the interception of telephone communications(illegal) |
|
|
Term
|
Definition
must strike a balance between preventing losses and protecting privacy |
|
|
Term
|
Definition
as new technology is developed offenders will exploit it security specialists and offenders are always in a constant war both sides will win the battle but no one will win the war |
|
|
Term
|
Definition
illegal trade of drugs illegal trade of guns illegal trade of arms illegal trade of intellectual property illegal trade of people illegal trade of money |
|
|