Term
|
Definition
| pertains to building construction designs that increase safety, what organizations and employees can do in preparation for emergencies and what they can do once an emergency occurs |
|
|
Term
| Fire Department prevention efforts |
|
Definition
| Facility planning, pre-fire planning, public education, codes, inspections and legal implications |
|
|
Term
|
Definition
| how to prevent a fire beforehand |
|
|
Term
|
Definition
| applies personnel, equipment and other resources to fire |
|
|
Term
|
Definition
|
|
Term
| Fire Prevention strategies |
|
Definition
| Inspections, planning, safety, good house keeping, HAZMAT incidents, evacuation and medical services and training. |
|
|
Term
| Fire suppression Strategies |
|
Definition
| integrated systems, detection of smoke & fires, portable extinguishers, sprinklers, standpipes and hose reels, firewalls and doors and access control |
|
|
Term
|
Definition
| accidents, bombthreats-explosions-terrorism, weapons of mass destruction, strikes, civil disturbance, sabotage, technological emergencies |
|
|
Term
|
Definition
| windstorms, floods, blizzards, earthquakes and hurricanes |
|
|
Term
|
Definition
| an outbreak of infectious disease that affect humans over a large geographic area |
|
|
Term
|
Definition
| diseases tha are transmitted between animal and human |
|
|
Term
|
Definition
| the condition of being safe from undergoing or causing hurt, injury or loss |
|
|
Term
|
Definition
| an unfortunate even resulting from carelessness, ignorance,unawareness or a combination of losses |
|
|
Term
|
Definition
| hurt damage or loss sustained |
|
|
Term
|
Definition
| a dangerous condition, behavior or object that can cause accidnet, injury or death |
|
|
Term
| What do worker compensation laws require? |
|
Definition
| employers to compensate injured employees |
|
|
Term
| Two primary cases of accidents |
|
Definition
| unsafe conditions, unsafe acts by people |
|
|
Term
|
Definition
| use of aggressive strategies to produce fear, coercion or violence for political, religious and criminal ends |
|
|
Term
| Psychological factors of terrorism |
|
Definition
| factors within an individual that influence terrorism |
|
|
Term
| Structural causes of terrorism |
|
Definition
| a repsonse to social-structural condition that groups are powerless to deal with through conventional political and military action |
|
|
Term
|
Definition
| unlawful use of force or violence committed by a group or individuals who has a connection to foreign power or whose activities transcend national boundaries against persons or property to intimidate or coerce a government or population. |
|
|
Term
|
Definition
| group working inside the US whose acts are directed at the US government and its people |
|
|
Term
| Terrorist acts are classified in 5 catagories (BNICE) |
|
Definition
| Biological,Nuclear, Incendiary,chemical and explosive |
|
|
Term
|
Definition
|
|
Term
|
Definition
| bombs constructed from readily available material or the misappropriation of military or commercial blasting supplies |
|
|
Term
|
Definition
| capable of inflicting mass causalities and destroy high value assets |
|
|
Term
|
Definition
| human reactions and events surrounding the use of WMD's that may result in limited or no causalities or physical damage |
|
|
Term
| 7 methods to confront terrorism |
|
Definition
diplomacy, intelligence*, military*, financial*, law enforcement, homeland security, business organizational security. (* most important) |
|
|
Term
|
Definition
| a concerted national effort to prevent terrorist attacks within the U.S., reduce America’s vulnerability to terrorism, and minimize the damage and recover from attacks that do occurs |
|
|
Term
| The four fronts of the National Strategy for Combating Terrorism: |
|
Definition
| Defeat, deny, diminish, defend |
|
|
Term
| Homeland Security Advisory System |
|
Definition
| was established to assist the Nation in remaining vigilant, prepared and ready to deter terrorist acts |
|
|
Term
| 5 levels of advisory system |
|
Definition
• Low condition (green)- low risk if attack • Guarded condition (blue)-general risk of attack • Elevated condition (yellow)- significant risk of attack • High condition (orange)- high risk of attack • Severe condition (red)- severe risk of attack |
|
|
Term
|
Definition
| the system and assets, whether physical or virtual, so vital to the U.S. that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matter |
|
|
Term
|
Definition
| publicly or privately controlled resources essential to the minimal operation of the economy and government |
|
|
Term
|
Definition
| individual targets whose destruction could cause large-scale injury, death or destruction of property, and/or profoundly damage national prestige and confidence |
|
|
Term
| Risk management framework includes the following activities: |
|
Definition
| setting goals, identifying assets- systems- networks and functions, access risk, prioritize, implement protective programs, measure effectiveness |
|
|
Term
|
Definition
| the use of natural agents in attacks on agriculture or directly on people |
|
|
Term
|
Definition
| the deliberate introduction of a disease agent, either against livestock or into the food chain, to undermine socioeconomic stability and/or generate fear |
|
|
Term
|
Definition
| consists of hardware or software that scrambles data, rendering it unintelligible to an unauthorized person intercepting it. |
|
|
Term
|
Definition
| computers as a target, computers as an instrument, computers as incidental to crime, crimes associated with prevalence of computers |
|
|
Term
|
Definition
• Security is never foolproof • Even state-of-the-art security has its vulnerabilities • Security is often as good as the time it takes to get through it |
|
|
Term
| Techniques of cybercriminals |
|
Definition
| denial of service, trojan horse, viruses and worms,logic bomb, dumpster diving, spam, phishing, key logging, spyware, malware |
|
|
Term
|
Definition
| is the amount of merchandise that has disappeared through theft, has become useless because of breakage or spoilage, or is unaccounted for because of sloppy recording |
|
|
Term
| Personnel factors attributing to losses |
|
Definition
| part-time or temporary worker, inexperienced workers, dissatisfied employees, high rate of turnover. |
|
|
Term
| Some strategies to address the problem of internal loss are |
|
Definition
| motivation, morale boosters and rewards, employee discounts, shopping services, undercover investigations |
|
|
Term
| Other categories that contribute to internal losses are |
|
Definition
| accidents, fire, unproductive employees(smokers), unintentional and intentional mistakes, excessive absenteeism and mistakes. |
|
|
Term
|
Definition
| nothing more then a piece of paper until the money is being collected |
|
|
Term
|
Definition
| the unlawful duplication of something valuable to deceive |
|
|
Term
|
Definition
| amateurs, juveniles or students, easy access, drunk or vagrant, addict, professional, kleptos |
|
|
Term
| Two prerequisites to an apprehension for shoplifting are |
|
Definition
Make sure to have seen the shoplifter conceal the stores merchandise. Never lose sight of the shoplifters |
|
|
Term
| Store personnel can detain shoplifters with that type of force? |
|
Definition
|
|
Term
|
Definition
| taking something from an individual bu for or threat of force |
|
|
Term
| Robbery protection strategies |
|
Definition
| alarms, CCTV, safes, bait money, security officers, armored car service. |
|
|
Term
|
Definition
| the unlawful entry in a structure with intent to commit another crime |
|
|
Term
| Retailers prevent burglaries by? |
|
Definition
| hardening the target, creating time delay and reducing loot. |
|
|
Term
|
Definition
| combined the Bank Protection Act of 1968 and the Bank Secrecy Act of 1986 into one document, which established minimum standards to combat robbery, burglary and larceny |
|
|
Term
| The Antiterrorism and Effective Death Penalty Act of 1996 |
|
Definition
| makes it a criminal offense for persons in the United States to engage in financial transaction with countries that condone or encourage terrorism |
|
|
Term
|
Definition
| is an attempt to make “dirty” money appear clean |
|
|
Term
| Types of crimes inherent on campuses? |
|
Definition
| crimes against persons, theft of property, drug abuse and distribution, vandalism |
|
|
Term
| Student right to know act of 1990 |
|
Definition
Requires crime awareness and prevention measures Requires reporting campus crime to the FBI Uniform Crime Reports program Requires making crime statistics available to students and the general public |
|
|
Term
| In 1992, the Campus Sexual Assault Victim’s Bill of Rights amended this act |
|
Definition
Requires schools to develop policies to deal with sexual assault on campus Requires prompt action from schools |
|
|
Term
| Security strategies for healthcare institutions |
|
Definition
Accountability and inventory control Auditing Applicant screening Access controls Patrols and CCTV Emergency room Newborn nursery Pharmacy Locker rooms Mortuary Patient property Protection of patient information |
|
|
Term
| typical profile of the workplace violator includes the following characteristics |
|
Definition
Disgruntled, chronic complainer Predominately white Age in the late 30s to early 40s Does not take responsibility for their own shortcomings Is seen as a troublemaker Is very difficult to supervise Is a marginal performer Has an obsession with weapons May identify with notorious violent incidents They are defensive and suspicious, have a fragile ego They are chronically angry and are in constant turmoil |
|
|
Term
| Some strategies for executive protection include |
|
Definition
Planning Education & training Avoidance of predictable patterns Recognition of tricks Protection at home Protection at the office Attacks while traveling Kidnap insurance |
|
|
Term
|
Definition
| occurs when both hostages and abductors become empathetic toward each other the longer they are together. |
|
|
Term
|
Definition
Alcoholism (most abused drug in America) Narcotics Depressants Stimulants Hallucinogens Inhalants |
|
|
Term
| Substance Abuse categories include |
|
Definition
Psychological dependence Addiction Tolerance Withdrawal |
|
|
Term
|
Definition
| is proprietary information that, if obtained by an unauthorized person, destroyed in a disaster, or lost, can cause harm to an organization |
|
|
Term
|
Definition
| a secret process that is used to produce a salable product |
|
|
Term
|
Definition
| provides protection for an invention or design |
|
|
Term
|
Definition
| includes words, symbols, logos, designs or slogans that identify products or services as coming from a common source |
|
|
Term
|
Definition
| provides protection for original works by giving the creator or publisher exclusive rights to the work |
|
|
Term
|
Definition
| internal attack, external attack, combined conspiracy |
|
|
Term
| first step to keeping sensitive information secure? |
|
Definition
| identify it and classify it among its value |
|
|
Term
| communication security involves defense against interception and includes? |
|
Definition
| line security, transmission security, emanation security(wireless), technical security |
|
|
Term
|
Definition
| utilized electronic devices to covertly listen to conversations(legal) |
|
|
Term
|
Definition
| the interception of telephone communications(illegal) |
|
|
Term
|
Definition
| must strike a balance between preventing losses and protecting privacy |
|
|
Term
|
Definition
as new technology is developed offenders will exploit it security specialists and offenders are always in a constant war both sides will win the battle but no one will win the war |
|
|
Term
|
Definition
illegal trade of drugs illegal trade of guns illegal trade of arms illegal trade of intellectual property illegal trade of people illegal trade of money |
|
|