問題一覧
1
is the protection of the company assets against loss of life and damage to property. Its main concern is the security and safety of each people and organization.
Personnel security
2
is a process of inquiry into the character reputation, discretion , integrity , morals and loyalty of an individual to determine the suitability for appointment or access to classified matter.
Personnel security investigation
3
Personnel security investigation has three general techniques
Background investigation positivity vetting profiling
4
this technique is very expensive but necessary is personal security . It serves to verify information on the application form and to obtain other information pertinent to the decision to employ
Background investigation
5
is the process of inspecting or examining with careful thoroughness the essence of vetting is a personal interview conducted under stress period it is based on information previously given by the applicant.
Positive vetting
6
is the process whereby a subject reaction in a future critical situation is predicted by observing his behavior, or by interviewing him , or analyzing his responses to a questionnaire , such as an honest test. The Reid Report is an example of honesty test.
Prowling
7
this process of using devices in detecting deception during the interview stage. This includes the use of a Polygraph Psychological Stress Evaluator and Voice Analyzer.
Deception detection techniques
8
this type of investigation seeks to gather information on income and mode of living, sometimes referred to as the earning- to-debt ratio.
Financial and lifestyle inquiry
9
this is the replacement of an agent in a role in which the agents true identity and role remains unknown , in order to obtain information for criminal prosecution or for recovery or limitation of assets losses.
Undercover investigation
10
is conducted to develop security awareness among employees in the company. It should cover all employees, regardless of rank or position.
Security education
11
Phases of security Education Program
Initial interview Orientation and training Refresher conference Security reminders Security promotion
12
ONE OR MORE PERSONS ACCOMPANYING ANOTHER TO GIVE GUIDANCE OR PROTECTION OR TO PAY HONOR
Escort
13
person or a group of persons usually armed and responsible for the physical safety of one or more specific person.
Bodyguard
14
Covers the surrounding areas of engagement.
Area security
15
Secures the immediate area surrounding the place of engagement.
Perimeter security
16
This are the advanced security at the place of engagement before the arrival of the VIP.
Advanced security
17
Accompanies the VIP wherever he goes.
Close-in security
18
On standby for possible black-up/re-enforcement.
Reserved security
19
neutralize the possible route of the VIP party.
Routine security
20
I'm individual is particularly vulnerable while moving from one place to another, hence a regular rout e and time travels should be established.
Protection in transit
21
The vehicle utilized by a potential kidnap victim should not be placed on attended in a parking stall with the individual name on it . If possible comma when not in use , the vehicle should be parked in a locked garage under guard and nor on the street .
Vehicle security
22
The approach will usually be made from the left or passing side, and the attacker will attempt to move over into the path of the victim's vehicles, forcing it to stop. Approach, would be from the right in the left side drive countries period the ideal location for abduction is where cross street are turn off is available to allowed attacker an easy quick way to escape. If two vehicles are used to attack, one will cut off the victim's vehicle, forcing it to stop.
Moving attacks
23
The drivers should always be planning ahead and be alert as to what is happening in at least two or three blocks of normal city driving. Vehicles that are packed in the roadway or in unusual position comma obstructions, constructions, etc.
The driver rule
24
The protection of the company property information from the inadvertent disclosure and destruction of documents is the paramount focus of information security management. It is closing the window of exposure. Information security in the industry is defined as
Information security
25
Access to information security is based on the required broad principles known as
CIA TRIAD
26
the assurance that information is only to those authorized to have access.
Confidentiality
27
the assurance that information and processing methods are accurate and complete.the assurance that information and processing methods are accurate and complete.
Integrity
28
the assurance that authorized users have access to information and associated assets when needed.
Availability
29
the assurance that authorized users have access to information and associated assets when needed.
Availability
30
Letters, diary and notebooks. These should be treated usually the same with official document.Letters, diary and notebooks. These should be treated usually the same with official document.
Personal
31
Orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of command.Orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of command.
Official
32
(green color code) — is any information and materials the unauthorized disclosure of it would cause exceptionally grave damage to the nation, politically, economically and military operation.
Top secret
33
red color code) — is any information and material, the unauthorized disclosure of it would endanger national security cause serious injury to the interest or prestige Of the nation or any governmental activity or advantage to a foreign nation.
Secret
34
blue color code) — Is any information or material, the unauthorized disclosure of it would be prejudicial to the interest and prestige of the national or governmental activity or would cause administrative embarrassment or unwanted injury to and be of advantage to and be of advantage to a foreign country.
Confidential
35
white or no color code) — is any information and material which requires special protection other than those determines confidential, secret and top secret. In the security management application, top secret is not used, classified matter will starts on secret classification. This is because the applications is limited or focused only to the industry•
Restricted
36
In this category these are records that are irreplaceable, records of which reproduction does not have the same value as the original; records needed to recover cash, to replace building, equipment’s, raw materials, finished products, and work in process and records needed to avoid delay in restoration of production, sales and services.
Vital documents
37
These include records the reproduction of which will close considerable expense and labor, or considerable delay.
Important documents
38
These include records whose loss might cause inconvenience but could be readily replaced and which would not in the meantime present an insurmountable obstacle to the prompt restoration of the business.
Useful documents
39
These records are daily files, routine in nature even if lost or destroyed, will not affect operation or administration.
Non essential documents
40
This consist of any formula, pattern, device or compilation of information which is used in one's business and which gives him an opportunity to gain an advantage over competitors who do not know or use it.
Trade secret
41
this is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of years.
Patent
42
the transfer of thought from We mind of one person to the mind of another thought a common medium or channel.
Communication
43
the exchange of thoughts or opinions by conversions, or seminar. The exchange could be from oral, written and other forms.
Conference
44
Refers to the common language known for two or more individuals who want to exchange thought or ideas with each other.
Medium of communication
45
The ability of an ancient man centuries ago to communicate by means of signs could be as the key for surviving the Stone Age era.
Communication security
46
Refers to the equipment’s being used to transfer thoughts or ideas.
Channel of communication
47
Communication on electromagnetic waves transmitted through the space.
Hand held radio or walkie talkie