問題一覧
1
These records are daily files, routine in nature even if lost or destroyed, will not affect operation or administration.
Non essential documents
2
person or a group of persons usually armed and responsible for the physical safety of one or more specific person.
Bodyguard
3
this is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of years.
Patent
4
the assurance that authorized users have access to information and associated assets when needed.
Availability
5
Letters, diary and notebooks. These should be treated usually the same with official document.Letters, diary and notebooks. These should be treated usually the same with official document.
Personal
6
The ability of an ancient man centuries ago to communicate by means of signs could be as the key for surviving the Stone Age era.
Communication security
7
Personnel security investigation has three general techniques
Background investigation positivity vetting profiling
8
white or no color code) — is any information and material which requires special protection other than those determines confidential, secret and top secret. In the security management application, top secret is not used, classified matter will starts on secret classification. This is because the applications is limited or focused only to the industry•
Restricted
9
this type of investigation seeks to gather information on income and mode of living, sometimes referred to as the earning- to-debt ratio.
Financial and lifestyle inquiry
10
This are the advanced security at the place of engagement before the arrival of the VIP.
Advanced security
11
is the protection of the company assets against loss of life and damage to property. Its main concern is the security and safety of each people and organization.
Personnel security
12
I'm individual is particularly vulnerable while moving from one place to another, hence a regular rout e and time travels should be established.
Protection in transit
13
The drivers should always be planning ahead and be alert as to what is happening in at least two or three blocks of normal city driving. Vehicles that are packed in the roadway or in unusual position comma obstructions, constructions, etc.
The driver rule
14
this process of using devices in detecting deception during the interview stage. This includes the use of a Polygraph Psychological Stress Evaluator and Voice Analyzer.
Deception detection techniques
15
is the process whereby a subject reaction in a future critical situation is predicted by observing his behavior, or by interviewing him , or analyzing his responses to a questionnaire , such as an honest test. The Reid Report is an example of honesty test.
Prowling
16
Access to information security is based on the required broad principles known as
CIA TRIAD
17
is a process of inquiry into the character reputation, discretion , integrity , morals and loyalty of an individual to determine the suitability for appointment or access to classified matter.
Personnel security investigation
18
The protection of the company property information from the inadvertent disclosure and destruction of documents is the paramount focus of information security management. It is closing the window of exposure. Information security in the industry is defined as
Information security
19
These include records the reproduction of which will close considerable expense and labor, or considerable delay.
Important documents
20
The vehicle utilized by a potential kidnap victim should not be placed on attended in a parking stall with the individual name on it . If possible comma when not in use , the vehicle should be parked in a locked garage under guard and nor on the street .
Vehicle security
21
In this category these are records that are irreplaceable, records of which reproduction does not have the same value as the original; records needed to recover cash, to replace building, equipment’s, raw materials, finished products, and work in process and records needed to avoid delay in restoration of production, sales and services.
Vital documents
22
the assurance that information and processing methods are accurate and complete.the assurance that information and processing methods are accurate and complete.
Integrity
23
This consist of any formula, pattern, device or compilation of information which is used in one's business and which gives him an opportunity to gain an advantage over competitors who do not know or use it.
Trade secret
24
(green color code) — is any information and materials the unauthorized disclosure of it would cause exceptionally grave damage to the nation, politically, economically and military operation.
Top secret
25
Orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of command.Orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of command.
Official
26
is conducted to develop security awareness among employees in the company. It should cover all employees, regardless of rank or position.
Security education
27
Covers the surrounding areas of engagement.
Area security
28
Communication on electromagnetic waves transmitted through the space.
Hand held radio or walkie talkie
29
On standby for possible black-up/re-enforcement.
Reserved security
30
Secures the immediate area surrounding the place of engagement.
Perimeter security
31
neutralize the possible route of the VIP party.
Routine security
32
this technique is very expensive but necessary is personal security . It serves to verify information on the application form and to obtain other information pertinent to the decision to employ
Background investigation
33
Refers to the equipment’s being used to transfer thoughts or ideas.
Channel of communication
34
is the process of inspecting or examining with careful thoroughness the essence of vetting is a personal interview conducted under stress period it is based on information previously given by the applicant.
Positive vetting
35
blue color code) — Is any information or material, the unauthorized disclosure of it would be prejudicial to the interest and prestige of the national or governmental activity or would cause administrative embarrassment or unwanted injury to and be of advantage to and be of advantage to a foreign country.
Confidential
36
Accompanies the VIP wherever he goes.
Close-in security
37
the assurance that information is only to those authorized to have access.
Confidentiality
38
Phases of security Education Program
Initial interview Orientation and training Refresher conference Security reminders Security promotion
39
red color code) — is any information and material, the unauthorized disclosure of it would endanger national security cause serious injury to the interest or prestige Of the nation or any governmental activity or advantage to a foreign nation.
Secret
40
this is the replacement of an agent in a role in which the agents true identity and role remains unknown , in order to obtain information for criminal prosecution or for recovery or limitation of assets losses.
Undercover investigation
41
the exchange of thoughts or opinions by conversions, or seminar. The exchange could be from oral, written and other forms.
Conference
42
These include records whose loss might cause inconvenience but could be readily replaced and which would not in the meantime present an insurmountable obstacle to the prompt restoration of the business.
Useful documents
43
the transfer of thought from We mind of one person to the mind of another thought a common medium or channel.
Communication
44
the assurance that authorized users have access to information and associated assets when needed.
Availability
45
The approach will usually be made from the left or passing side, and the attacker will attempt to move over into the path of the victim's vehicles, forcing it to stop. Approach, would be from the right in the left side drive countries period the ideal location for abduction is where cross street are turn off is available to allowed attacker an easy quick way to escape. If two vehicles are used to attack, one will cut off the victim's vehicle, forcing it to stop.
Moving attacks
46
ONE OR MORE PERSONS ACCOMPANYING ANOTHER TO GIVE GUIDANCE OR PROTECTION OR TO PAY HONOR
Escort
47
Refers to the common language known for two or more individuals who want to exchange thought or ideas with each other.
Medium of communication