










Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A glossary of terms related to security, including definitions of key concepts such as assets, contract security, disturbances, evidence, and jurisdiction. it also presents a series of questions and answers testing understanding of security principles, covering topics like access control, risk management, and trespass. The content is suitable for introductory security training in university or high school settings.
Typology: Exams
1 / 18
This page cannot be seen from the preview
Don't miss anything!
Arrest ✔✔To seize and take somebody into legal custody
Assets ✔✔Someone, something, or somewhere that contributes to the success of a business. People are often the most important _______ to a company.
Contract ✔✔Hired from outside of the hiring body
Detention ✔✔The act of keeping somebody in custody, or the state of being kept in custody
Disturbances ✔✔Any acts that cause disruption to others or hinders them from pursuing normal legal activities.
Drafting ✔✔writing a first version to be filled out and polished later
Evidence ✔✔Materials or information linked to a crime
In-House ✔✔Privately Hired security personnel responsible only for the facility their employer owns
Jurisdiction ✔✔The area over which legal authority extends
Laying ✔✔Giving information relevant to a charge
Legislation ✔✔A law or laws passed by an official body, especially a governmental assembly
Man made threats ✔✔Anything that is liable to cause harm or damage by a person or group
Monitoring ✔✔To watch over somebody or something, especially in order to ensure that good order or proper conduct is maintained
Natural threats ✔✔Things or events that have the potential to cause damage i.e. storms, floods, etc.
Preliminary Investigation ✔✔Coming before or leading up to the full investigation
Electro-Magnetic, Acoustic, Mechanical or Other Device ✔✔any device or apparatus that is used or is capable of being used to intercept any function of a computer system, but does not include a hearing aid used to correct subnormal hearing of the user to not better than normal hearing.
Intercept ✔✔Includes listening to a function of a computer system, recording a function of a system, acquiring the substance or meaning of a system, or purporting/false acting of a system.
Traffic ✔✔Means, in respect of a computer password, to _______, sell, export from or import into Canada, distribute or deal with in any other way.
Piracy of Software ✔✔Software is protected by copyright. Unauthorized use is a violation of this law. Unauthorized copying of software may result in liability for the individual using the software or his or her employer.
Industrial Espionage ✔✔Like piracy of software, _______________ simply represents a specialized type of theft. Industrial secrets - like the recipes for Kentucky Fried Chicken® and Dad's Cookies® - are often valuable, and carefully protected by the companies that own them.
Top Secret ✔✔Unauthorized disclosure would cause exceptionally grave damage to the nation.
Secret ✔✔Unauthorized disclosure would endanger National Security, cause serious injuries to the interest or prestige of the Nation or any Government Activity thereof, or would be of great advantage to a Foreign Nation.
Confidential ✔✔Unauthorized disclosure would be prejudicial to the interest or prestige of the Nation or any Government activity, or be of an advantage to a Foreign Power, individual personnel files may be accorded the protection of this classification.
Restricted ✔✔Should not be published or communicated to anyone except for official purposes. In industry, similar classifications are used to identify information and material that must be kept from competitors and the public.
Virus ✔✔A program that can infect other programs by modifying them to include a copy of itself (possibly evolving as it progresses).
Worm ✔✔A program that spreads copies of itself through the network and attached computers.
proprietary departments. ✔✔Security organizations that are part of a company
Two types of organizational management? ✔✔proprietary and contract
Threat assessment ✔✔The process that identifies threats and determines probability and criticality factors
Which parts of a lock are subject to attack or compromise? ✔✔The keying device, The latch or bolt, and The operating mechanism
Trust but ✔✔Verify
The best fences are those that are constructed in straight lines ✔✔True
Crime happens when three elements come together at the proper place and time. They are ✔✔Skills, Desire and Opportunity
Good lighting does not have a psychological deterrent effect for the lighted area. ✔✔False
The first step towards providing adequate security to a location is to ✔✔Define our boundaries
Clear Zone ✔✔The area around a fence that is intended to make intruders visible to patrol officers is called a
The rule of gates is: ✔✔If you don't need it, keep it locked.
What four factors have to be considered when we look at lighting from a security perspective? ✔✔Size, Contrast, Brightness, Time
Soft physical security components consist of ✔✔rules and procedures.
Fresnel Light ✔✔A light with a fan shaped beam that goes out 180 degrees horizontally
the most common type of security illumination. ✔✔Continuous lighting
The security officer acts as the _____________of the landlord. ✔✔Agent
There are ____ types of trespass. ✔✔ 2
Whether or not the eviction goes smoothly, security personnel should ____every instance where people are advised to move off the property. ✔✔Document
When assessing the situation, the security officer should think about ✔✔The Violation
The Subject
The Audience
The Environment
Burglary differs from trespassing in that there is an absence of _____with trespassing. ✔✔Intent to commit a crime or theft therein
Computer crime ✔✔the unauthorized access to computer information for criminal purposes by someone without the legal right of access.
Public Security Officers ✔✔Security officers who work for the Government.
A Security Officer's most important role ✔✔observe and report.
Private security for a company or person is known as ✔✔In-house Security.
Basic Security Functions ✔✔Building and Perimeter Security
Access Control and Intrusion Detection
Alarm and Surveillance Systems Control / Monitoring
Fire Detection, Suppression and Response
Emergency and Disaster Response and Control
Accident Prevention and Safety Monitoring
Enforcement of Rules and Regulations
Security officer Duties ✔✔Protect the buildings and grounds
Enforce the rules and regulations
Direct traffic (foot and vehicle)
Maintain order on their post (assistance and information)
Familiarize themselves with all special and general orders and carry them out to the letter
Be physically fit / emotionally fit. Be calm in the face of aggression
Understanding authority and power
Be mindful of the needs of others
Never stop learning
What to do with angry people ✔✔Listen: don't speak unless you have something to say
Acknowledge feelings. Statement of regret; I am sorry that this happened to you. Don't place blame
Find agreement. Listen for items that both of you agree on
Identify the problem: find the underlying cause of the anger
Identify a solution; does not have to be permanent, just workable
Don't say you won't do something, say that you can't do it
Close properly. Review the solution and thank them
Communicate confidently
Don't take it personally
Be firm and Assertive you are the one in control
Law Enforcement Relations ✔✔Know the police officers
Set up an area for officers
Become familiar with local laws and police procedures
Maintain incident scenes in a professional manner
Develop close working relationships
The goal is trust
The Five C's of writing a report ✔✔Completeness, Conciseness, Clarity, Correctness, and Courtesy
Cymbals ✔✔Color
Year
Make
Body style
And
License Number
Special Characteristics / State
Things People can't change easily ✔✔Hair
Simple rules of Report Writing ✔✔Write Simple. Short clear and accurate words. Sentences > 22 words.
Write in First Person
Write in Chronological Order
Do not use jargon or slang
Remember the rules of grammar
Hard Physical Security ✔✔Physical objects: locks and keys, barriers, alarms, lighting
Two factors of Threat Assessment ✔✔criticality and probability
Military Model of Defence Lines ✔✔1. Property line: man-made barriers or constructed barriers (fences)
The Big Three (Hard security ✔✔Lights, Locks, Fences
Continuous lighting ✔✔fixed zones of light
Standby lighting ✔✔turned on in specific circumstances
Movable Lighting ✔✔Lights that are able to be moved in specific circumstances
Emergency lighting ✔✔when other lighting sources fail
Lever Lock ✔✔fire cabinets/desks.
Warded locks ✔✔keyhole you can see through
Disc tumbler lock ✔✔antique automotive lock
Pin Tumbler lock ✔✔Most widely used in security. 7+ tumblers