Term
Why are internal info systems attacks a people problem? |
|
Definition
Because of the psychological profile of IT employees:
Tend to be introverts
Prefer to work independently
Less likely to handle work stress in constructive manner
May show disgruntled behavior online rather than by less destructive means
|
|
|
Term
| Internal Affairs can take the form of ? |
|
Definition
employee theft
pifredge
embezzlement
|
|
|
Term
| Two major causes of employee theft |
|
Definition
Personal problems
The enviornment |
|
|
Term
What is the "Formula" for employee they? (Cressey)
|
|
Definition
| motivation+opportunity+rationalization=theft |
|
|
Term
Differential association
(Sutherland) |
|
Definition
Superiors and colleagues in a company are probably more important determinants of crime than is the personality of the individual
(Everyone in your work is dishonest, making you want to and do) |
|
|
Term
| Three ways to remedy internal property theft |
|
Definition
Set up inventory system
Mark property
Use metal detectors |
|
|
Term
| What is a an intergrated system? |
|
Definition
| the control and opporation by a single oporator of multiple systems whose percetption is that only a single system is performing all fuctions. |
|
|
Term
| Types of Biometric security |
|
Definition
fingerprint scan
hand scan
iris scan
retina scan
voice scan
physical action and writing
facial scan |
|
|
Term
| What is Dual technologies? |
|
Definition
| a combination of different types of intrusion systems |
|
|
Term
| Types of unauthorized entry |
|
Definition
forced entry
smash and grab attacks
unforced entry-nonlocked doors
surrepticious- people hinding in bathrooms
|
|
|
Term
| Five countermeasures for external theft |
|
Definition
deter
detect
delay
deny
destroy |
|
|
Term
|
Definition
Crime prevention through eviornmental protection
better lighting
less shrubery
retrofit buildings |
|
|
Term
Situational Crime Prevention
(SCP) |
|
Definition
| managerial and user behavior factors that affect opportunities for criminal behavior in a specific setting for specific crime |
|
|
Term
|
Definition
| individuals calculate outcomes and inputs including the potential pay off, risk and needs |
|
|
Term
| Routine Activities Theory |
|
Definition
| day-to-day activities of people result in the convergeance of motivated offenders and victims |
|
|
Term
|
Definition
| focuses on the activity of the victim, as a contributing factor in criminal acts and victimization |
|
|
Term
|
Definition
| an outer boundary and the first line of defense against unauthorized acces |
|
|
Term
Five types of barriers that prevent theft
|
|
Definition
natural
structural
human
animals
energy |
|
|
Term
| Types of protected windows |
|
Definition
laminated glass
acrylic windows
burglar resistant
poly carbonate windows(plexiglass)
electronic security glass |
|
|
Term
| Intrusive detection systems |
|
Definition
point detection
area protection
perimeter protection |
|
|
Term
| What are the two major purposes of lighting |
|
Definition
create psychological deterant
enable detection |
|
|
Term
three types of light measure
|
|
Definition
lumens
illumenance
foot candle power |
|
|
Term
|
Definition
activities performed by personel to furter the goals of security and loss prevention
|
|
|
Term
|
Definition
| manufactured items that increase security |
|
|
Term
| Five rules toward making a wise purchasing decesion |
|
Definition
buyer beware-get what you pay for
properly evaluate the needs of the organization
aquire info and know state of the art
analyze advantages and disadvantages
avoid panic buying |
|
|
Term
| client interested in hiring a Loss Prevention Consultant will be involved in 3 specific phases |
|
Definition
Selection
direction
evaluation |
|
|
Term
|
Definition
| purchasing from outside companies, services that were previously performed in-house |
|
|
Term
| Six basic question to ask during an investigation |
|
Definition
Who
What
Where
When
How(most important)
Why |
|
|
Term
| Types of investigations in the private sector are? |
|
Definition
applicant background
criminal office
computer crime
accidents
fire and arson
neglect and civil liability
insurance
labor matters
due dillgence
|
|
|
Term
| Whats the difference between Overt and Undercover? |
|
Definition
|
|
Term
What are the three classifications of evidence
|
|
Definition
Direct
Circumstantial
Hearsay |
|
|
Term
|
Definition
| directly proves of disproves a fact without drawing an inference |
|
|
Term
| What is circumstantial evidence? |
|
Definition
| indirectly proves or disproves a fact and an inference must be made |
|
|
Term
|
Definition
| Second-hand information or what someone heard |
|
|
Term
| Know the difference in interrogation and interview |
|
Definition
|
|
Term
| Strategies during an interview |
|
Definition
ask open ended questions
maintain silence
build up interveiwee memory
test honesty |
|
|
Term
| Strategies during interrogations |
|
Definition
discuss seriousness of incident
request story several times
appeal to emotions
point out inconsistancies in statements
confront the interveiwee with some evidence(false or true) |
|
|
Term
|
Definition
|
|
Term
| Investigative leads can include? |
|
Definition
scene of the loss
evidence
victim
motive
witnesses
informants |
|
|
Term
|
Definition
| act of watching or observing an individual |
|
|
Term
|
Definition
| is a pretrial disovery method whereby the oposing party askes quesitons of the other party under oath while a word-for-word transcript is recorded |
|
|
Term
|
Definition
| the recording, sorting, summarizing, reporting and interpreting data related to business transactions |
|
|
Term
|
Definition
| the examination or checking of something with the purpose of which is to uncover deviations |
|
|
Term
| Importance of accountability |
|
Definition
| key to survival strategies |
|
|
Term
| Private securities litigation reform act |
|
Definition
| requires CPAs who audit publicy help companies to take steps to detect fraud |
|
|
Term
| Two areas that auditors should dilegeantly work to detect |
|
Definition
financial reporting fraud
missappropriation of assets |
|
|
Term
|
Definition
| measuremnt of the frequency probability and severity of lasses from exposure to threats or hazards |
|
|
Term
|
Definition
| make the most efficient before the loss arrangement for an after the loss continuation of business |
|
|
Term
| Factors that influence roles of risk management |
|
Definition
top management
external influences
nature of business
copporate developments
characteristics of risk management |
|
|
Term
| 5 steps in the risk management process |
|
Definition
risk identification
quantative analysis
evaluate treatment options
implementation
monitor and adjust |
|
|
Term
| 5 tools to deal with risk |
|
Definition
risk avoidance
transfer risk
risk abatement
risk spreading
risk assumption |
|
|
Term
| insurance rates are dependant of two variables |
|
Definition
frequency of claims
the cost of each claim
|
|
|
Term
| two forms of control for insurance companies |
|
Definition
comptetition among insurance agencies
government regulations |
|
|
Term
| two types of prevention against crime losses |
|
Definition
fidelity and surety bond
burglary, robbery and theft insurance |
|
|
Term
|
Definition
| requires employee to be investigate to limit the risk of dishonesty for the insured |
|
|
Term
|
Definition
| agreement providing for compensation if there is a failure to preform specified acts within a certain period of time |
|
|
Term
|
Definition
| a legal instrument whereby one party(surety) agrees indermnify another party(the obligee) of the obligee incures a loss from the person bonded(the principle or obligor) |
|
|
Term
|
Definition
| a comprehensive managed effore to prioritize key processes, identify signifigant streats to normal operation and plan mitigation strategies to ensure effective and efficient organizational repsonse to the challenges that surface during and after a crises |
|
|
Term
| 7 step methodology for business continuity |
|
Definition
risk assessment report
business impact analysis report
disaster recovery plan
business recovery plan
business resumption plan
contingency planning
crises management |
|
|
Term
| Five disciplines of emergency management |
|
Definition
mitigation
response
recovery
preparedness
communications |
|
|