Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Security Training: Definitions, Questions, and Answers, Exams of Social Security Law

A glossary of terms related to security, including definitions of key concepts such as assets, contract security, disturbances, evidence, and jurisdiction. it also presents a series of questions and answers testing understanding of security principles, covering topics like access control, risk management, and trespass. The content is suitable for introductory security training in university or high school settings.

Typology: Exams

2024/2025

Available from 05/02/2025

WINGS_TO-FLY
WINGS_TO-FLY 🇺🇸

1

(1)

1.2K documents

1 / 18

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Security Training: Part 1 Terms 100%
Correct
Arrest ✔✔To seize and take somebody into legal custody
Assets ✔✔Someone, something, or somewhere that contributes to the success of a business.
People are often the most important _______ to a company.
Contract ✔✔Hired from outside of the hiring body
Detention ✔✔The act of keeping somebody in custody, or the state of being kept in custody
Disturbances ✔✔Any acts that cause disruption to others or hinders them from pursuing normal
legal activities.
Drafting ✔✔writing a first version to be filled out and polished later
Evidence ✔✔Materials or information linked to a crime
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12

Partial preview of the text

Download Security Training: Definitions, Questions, and Answers and more Exams Social Security Law in PDF only on Docsity!

Security Training: Part 1 Terms 100%

Correct

Arrest ✔✔To seize and take somebody into legal custody

Assets ✔✔Someone, something, or somewhere that contributes to the success of a business. People are often the most important _______ to a company.

Contract ✔✔Hired from outside of the hiring body

Detention ✔✔The act of keeping somebody in custody, or the state of being kept in custody

Disturbances ✔✔Any acts that cause disruption to others or hinders them from pursuing normal legal activities.

Drafting ✔✔writing a first version to be filled out and polished later

Evidence ✔✔Materials or information linked to a crime

In-House ✔✔Privately Hired security personnel responsible only for the facility their employer owns

Jurisdiction ✔✔The area over which legal authority extends

Laying ✔✔Giving information relevant to a charge

Legislation ✔✔A law or laws passed by an official body, especially a governmental assembly

Man made threats ✔✔Anything that is liable to cause harm or damage by a person or group

Monitoring ✔✔To watch over somebody or something, especially in order to ensure that good order or proper conduct is maintained

Natural threats ✔✔Things or events that have the potential to cause damage i.e. storms, floods, etc.

Preliminary Investigation ✔✔Coming before or leading up to the full investigation

  1. Interacts with computer programs , and
  2. Performs logic and control, and may perform any other function.

Electro-Magnetic, Acoustic, Mechanical or Other Device ✔✔any device or apparatus that is used or is capable of being used to intercept any function of a computer system, but does not include a hearing aid used to correct subnormal hearing of the user to not better than normal hearing.

Intercept ✔✔Includes listening to a function of a computer system, recording a function of a system, acquiring the substance or meaning of a system, or purporting/false acting of a system.

Traffic ✔✔Means, in respect of a computer password, to _______, sell, export from or import into Canada, distribute or deal with in any other way.

Piracy of Software ✔✔Software is protected by copyright. Unauthorized use is a violation of this law. Unauthorized copying of software may result in liability for the individual using the software or his or her employer.

Industrial Espionage ✔✔Like piracy of software, _______________ simply represents a specialized type of theft. Industrial secrets - like the recipes for Kentucky Fried Chicken® and Dad's Cookies® - are often valuable, and carefully protected by the companies that own them.

Top Secret ✔✔Unauthorized disclosure would cause exceptionally grave damage to the nation.

Secret ✔✔Unauthorized disclosure would endanger National Security, cause serious injuries to the interest or prestige of the Nation or any Government Activity thereof, or would be of great advantage to a Foreign Nation.

Confidential ✔✔Unauthorized disclosure would be prejudicial to the interest or prestige of the Nation or any Government activity, or be of an advantage to a Foreign Power, individual personnel files may be accorded the protection of this classification.

Restricted ✔✔Should not be published or communicated to anyone except for official purposes. In industry, similar classifications are used to identify information and material that must be kept from competitors and the public.

Virus ✔✔A program that can infect other programs by modifying them to include a copy of itself (possibly evolving as it progresses).

Worm ✔✔A program that spreads copies of itself through the network and attached computers.

proprietary departments. ✔✔Security organizations that are part of a company

Two types of organizational management? ✔✔proprietary and contract

Threat assessment ✔✔The process that identifies threats and determines probability and criticality factors

Which parts of a lock are subject to attack or compromise? ✔✔The keying device, The latch or bolt, and The operating mechanism

Trust but ✔✔Verify

The best fences are those that are constructed in straight lines ✔✔True

Crime happens when three elements come together at the proper place and time. They are ✔✔Skills, Desire and Opportunity

Good lighting does not have a psychological deterrent effect for the lighted area. ✔✔False

The first step towards providing adequate security to a location is to ✔✔Define our boundaries

Clear Zone ✔✔The area around a fence that is intended to make intruders visible to patrol officers is called a

The rule of gates is: ✔✔If you don't need it, keep it locked.

What four factors have to be considered when we look at lighting from a security perspective? ✔✔Size, Contrast, Brightness, Time

Soft physical security components consist of ✔✔rules and procedures.

Fresnel Light ✔✔A light with a fan shaped beam that goes out 180 degrees horizontally

the most common type of security illumination. ✔✔Continuous lighting

The security officer acts as the _____________of the landlord. ✔✔Agent

There are ____ types of trespass. ✔✔ 2

Whether or not the eviction goes smoothly, security personnel should ____every instance where people are advised to move off the property. ✔✔Document

When assessing the situation, the security officer should think about ✔✔The Violation

The Subject

The Audience

The Environment

Burglary differs from trespassing in that there is an absence of _____with trespassing. ✔✔Intent to commit a crime or theft therein

Computer crime ✔✔the unauthorized access to computer information for criminal purposes by someone without the legal right of access.

Public Security Officers ✔✔Security officers who work for the Government.

A Security Officer's most important role ✔✔observe and report.

Private security for a company or person is known as ✔✔In-house Security.

Basic Security Functions ✔✔Building and Perimeter Security

Access Control and Intrusion Detection

Alarm and Surveillance Systems Control / Monitoring

Fire Detection, Suppression and Response

Emergency and Disaster Response and Control

Accident Prevention and Safety Monitoring

Enforcement of Rules and Regulations

Security officer Duties ✔✔Protect the buildings and grounds

Enforce the rules and regulations

Direct traffic (foot and vehicle)

Maintain order on their post (assistance and information)

Familiarize themselves with all special and general orders and carry them out to the letter

Be physically fit / emotionally fit. Be calm in the face of aggression

Understanding authority and power

Be mindful of the needs of others

Never stop learning

What to do with angry people ✔✔Listen: don't speak unless you have something to say

Acknowledge feelings. Statement of regret; I am sorry that this happened to you. Don't place blame

Find agreement. Listen for items that both of you agree on

Identify the problem: find the underlying cause of the anger

Identify a solution; does not have to be permanent, just workable

Don't say you won't do something, say that you can't do it

Close properly. Review the solution and thank them

Communicate confidently

Don't take it personally

Be firm and Assertive you are the one in control

Law Enforcement Relations ✔✔Know the police officers

Set up an area for officers

Become familiar with local laws and police procedures

Maintain incident scenes in a professional manner

Develop close working relationships

The goal is trust

The Five C's of writing a report ✔✔Completeness, Conciseness, Clarity, Correctness, and Courtesy

Cymbals ✔✔Color

Year

Make

Body style

And

License Number

Special Characteristics / State

Things People can't change easily ✔✔Hair

Simple rules of Report Writing ✔✔Write Simple. Short clear and accurate words. Sentences > 22 words.

Write in First Person

Write in Chronological Order

Do not use jargon or slang

Remember the rules of grammar

Hard Physical Security ✔✔Physical objects: locks and keys, barriers, alarms, lighting

Two factors of Threat Assessment ✔✔criticality and probability

Military Model of Defence Lines ✔✔1. Property line: man-made barriers or constructed barriers (fences)

  1. Exterior of a building or structure: locked secure windows
  2. Interior controls: access controls, alarms, locks, safes, etc.

The Big Three (Hard security ✔✔Lights, Locks, Fences

Continuous lighting ✔✔fixed zones of light

Standby lighting ✔✔turned on in specific circumstances

Movable Lighting ✔✔Lights that are able to be moved in specific circumstances

Emergency lighting ✔✔when other lighting sources fail

Lever Lock ✔✔fire cabinets/desks.

Warded locks ✔✔keyhole you can see through

Disc tumbler lock ✔✔antique automotive lock

Pin Tumbler lock ✔✔Most widely used in security. 7+ tumblers