ASIS CPP "Security Principles " Flashcards Help in Exam



ASIS CPP "Security Principles "
Flashcards Help in Exam








Hallcrest: framed private security characteristics, its effect on crime control, and established a working relationship between private security and public law enforcement

Hallcrest recommendations: code of ethics, legislation, interstate licensing

Hallcrest II: profiled changes within the industry, identified security/law enforcement issues/trends, and researched security/law enforcement alliance

Organization: the arrangement of people with a common objective or purpose

Managerial function: plan, direct, coordinate, control, and organize

Line item budget (or plan in financial terms): oldest and simplest method of budgeting

Capital and program budgeting: also common

Zero-based budgeting: estimate of cost and revenues with a built-in warning mechanism

Ethics: rules by which members of a profession regulate their conduct

Security processes: information, physical, and personnel

Security’s main objectives: protection of assets and the prevention of losses

Security’s most conspicuous role: protective services

Security functions: cut across departmental lines and consist of involvement into every activity of the company without significant interference

Security department’s performance: most dependent upon officer performance

Each employee must know (POP): policy (what), objective (why), and procedure (how)

Job analysis: activities/responsibilities, interaction, qualifications, and conditions

Personnel security programs: to address job specifications via of a job description

Personnel security process: recruitment/hiring/discrimination safeguards and controls

Security awareness program: state of mind (separate but related to training)

Security managers motivate: through constructive discipline; not punishment

Discipline: the primary responsibility of the supervisor; training to correct, mold, strengthen

Discipline: management tool to condemn unacceptable behavior (not employee)

Discipline: to be administered immediately; any mistake of fact can be corrected at the next performance appraisal

3 basic management roles: interpersonal, informational, and decisional

Communication: most important management tool according to Sennewald

Written communication: best form of communication

Listening: first skill a manager must learn

Non-directional counseling: primarily involves good listening

Leadership: the influence one has on others in the pursuit of organizational objectives

Leadership styles: autocratic, bureaucratic, diplomatic, participative, free rein (avoids decision making),compelling (threats), and impelling (group force)

Supervision: goal of performance as outlined by management

Security manager (head of security): to report to a vice-president or higher

Security manager: conducts the inspection of a security department

Chain of command: path along which authority flows

Management by objective (MBO/ Peter Drucker): systematic method of achieving agreed upon Goals set in advance between a manager and subordinate

Program evaluation and review technique (PERT): controlling efforts toward a common goal

Douglas McGregor’s concept: every executive relates to his subordinates on the basis of a set of

assumptions termed Theory X and Y

McGregor’s Theory X (autocratic): emphasizes negative aspects of employee behavior

McGregor’s Theory Y (supportive): suggests that employees do not inherently dislike work, and will actually seek responsibility and better performance if encouraged to do so

Theory Z: recent Japanese style of humanized working conditions and close relationships

Custodial theory: employees will be content through economic benefits (non-motivating)

3 main theories of organizational behavior: autocratic (Theory X), custodial, and supportive (Theory Y) theories

Chris Argis (immaturity/maturity theory): work climate should provide for maturity

Warren Bennis: employee satisfaction vs. organizational requirements

Dr. Frederick Herzberg (motive-hygiene theory, or work motivation theory): motivation comes from the work itself, not from factors such as salary and job security

Dr. Mazlow (hierarchy of needs): physiological, safety, love, esteem, self-actualization

Loss prevention: any method (guards, insurance, etc.) to prevent and control loss

Loss prevention: determines probability, frequency, and cost of loss

Predatory prevention matrix: proactively promote, plan, and implement

Four D’s of loss prevention: deter, detect, delay, and deny

Protection program primary objective: motivate every employee to be part of the team

Most effective deterrent to shoplifting: well-trained store personnel

Defensible Space (Oscar Neuman): ideas and applied strategies from the New York public housing project to reduce the risk of victimization, and fear of street crime

Building site: first factor to be considered in facility construction

Environmental security (E/S): urban planning and design process integrating crime prevention with neighborhood design

Image and milieu: area design to counteract the perception of isolation/vulnerability

CPTED: crime prevention through environmental design

Security: stable and relatively predictable environment free of fear of disruption or injury

5 security levels: minimum, low, medium, high, and maximum

5 security level interventions: progresses from impede only at minimum level to impede, detect, assess, internal-external, and neutralize at maximum level

Security in-depth: progressively difficult barriers placed in the path of the aggressor

Security analysis: an in-depth study of risk management

4 security matrix factors: policy, control, risk, and phases of attack

Security survey: critical examination/analysis of the present security status of a property in terms of deficiencies/excesses, protection required, and recommendations

Crime prevention survey: focuses on deterrence regardless of physical safeguards in place

Crime control: ID root cause, opportunities (general/specific), develop a systems approach

Vulnerability study: establishes a priority in the protection of assets

Degree of protection: based upon criticality and vulnerability

Loss event profiling: typing risks, their probability, and degree of protection

Loss event probability: probability of risks becoming actual loss

Loss event criticality: impact on the enterprise if the loss occurs

PML: Possible Maximum Loss (destroyed), or Probable Maximum Loss (likely to sustain)

ALE: Annualized Loss Expectancy of not doing something (e.g., adding a back-up generator); used when computing return on Investment (ROI)

Risk abatement: reduction of risk

Risk analysis: used to match security measures with threats in order to minimize risks

Risk assessment: determining the probability and cost of potential loss

Risk assumption: the organization assumes the loss

Risk avoidance: the decision to avoid risks

Risk cells: intent, capacity, and opportunity

Risk exposure: identifies types of risks/losses, and their probabilities of occurrence

Risk management: pre-loss arrangements to ensure post-loss business continuation

Manpower: major resource required for a risk analysis

Risk spreading: reducing the likelihood of total loss (e.g., disks stored off-site)

Risk transfer: to transfer risk to insurance

4 risk countermeasures: personnel, electronics, hardware, and procedural/policy

Pure risk: no potential for benefit (e.g., earthquake)

Dynamic risk: can produce gain or profit (e.g., Las Vegas)

Quantified loss potential: the impact or severity of the loss on business

Insurance rates: dependent upon cost and frequency claims

Best basic types of protection: fidelity/surety bonds, burglary/theft/robbery insurance

Fiduciary bonds: assures trustworthiness of persons appointed by the court

Fidelity bond: insurance company indemnifies the employer against employee dishonesty

Surety bond: protects against another’s failure to perform specified acts on time

Indemnity bond: protects an individual/organization against losses of a specified type

Span of Control principle: ideal 1:3, good 1:6, acceptable 1:12

Employee theft: causes 1/3 of all business failures

Computer security incidents: 80% by dishonest and disgruntled employees

Hackers: only 1% of annual computer security incidents

Alcoholism candidate: white male over 40 and living alone

Heroin: semi-synthetic narcotic (white to dark brown [1- 98% pure], black tar 20- 80%)

False alarms: 95% to 99% of activated alarms

Growth: 1% per year for police, and 2.3% per year for security

2000 expenditures: $44 billion for police, and $104 billion for security

Guardianship: nearby people who can protect an intended victim

The security and loss prevention program begin: identifying threats, hazards and risks that face an organization

Risk analysis interchangeable: risk assessment, risk evaluation

The survey document consist of a: checklist

Risk analysis is to be done quantitatively (when): organization is large, exposure cannot be evaluated

Those who plan protection should have a: clear understanding of organization needs, corporate culture, customer needs

A risk analysis provides input for: planning protection

Security strategies generally take the form of: Personnel, systems and policies and procedures

The system prospects looks at interactions among: Sub systems

Standard and regulations serves for employees as: Resource

The concept of what a reasonable person with similar training and equipment would do in a similar situation, is called: Standard of care

Leadership style: influence success

Autocratic style: managers taking all decision

Democratic style: opinions from employees

Authority: right to act

Power: the ability to act

Policies: control employer decision making

Procedure: way of doing

Line personnel: authority and function (chain of command)

Defensible Space: a substitute term for the range of mechanisms – real and symbolic barriers, strongly defined areas of influence, improved opportunities for surveillance that combine to bring an environment under the control of its residents.

Risk management theory draws on probability and statistics, mathematics, engineering, economics, business and the social sciences among other disciplines. The study of risk has expanded to include the understanding of the psychological, cultural, and social context of risk.

Risk perception theory focuses on how humans learn from their environment and react to it. The psychometric approach is another method of research risks; it involves a survey to measure individual views of risks.

Risk communication theory concerns itself with communication perception of experts, and lazy citizens. Risk communication theory is important because it holds answers for educating and preparing citizens for emergencies.

Predictive Modeling: The ultimate value of loss reporting will be in the opportunities created for avoiding future losses. By carefully analyzing the statistically valid data developed in the loss files, future loss avoidance can be identified.

Delphi Approach (developed during World War II): consists of sending a structured questionnaire to a group of experts and then conducting a statistical analysis to generate probabilistic forecasts

Game theory: likelihood and targets of a future terrorists attack can be modeled by understanding the operational and behavioral characteristics of terrorist’s organization (helps insurance companies understand risk and set premiums)

Key training concepts: learning, retention and transfer, socialization, education, training & development

Learning (domains) cognitive (knowledge based), affective (attitudinal / perceptual), psychomotor (physical skills)

Moral turpitude: Violation of trust (contrary good morals, justice, honesty)

Job offer: (After background investigation)

Blind add: non entry level (skilled, technical, managerial)

Applicant first contact: Personnel department

Initial interviews: With security representative (supervisor)

Secondary interviews: By manager

Applicant claim (discrimination): HR Department

Initial Interviews (purpose): interest & qualification, need of department

Interviewer preparation: Study written application (in private)

Employment interview should be: sensitive and empathetic fashion

Job qualification: acquired skills, experience, education, temperament, personality

Goal is objectivity: problem is subjectivity

Best candidate not selected : bias (interviewer)

Paper and pencil test: identify (attitude)

Security employees serve: manner above reproach

Military discharge form: DD form 214

Performance (security dept): depends on: care and attention of (personnel selection)

Background investigation and screening: before job offer

discrimination: yes (for normal unsuitability) (Standard SI)

Moral turpitude: not felony conviction

Security officer must not: suffer (felony conviction)

Initial screening: by HR dept

Discrimination: Yes (moral turpitude)

Standard (lowest entry level): no conviction (moral turpitude), responsible, nature, honest, no (physical or emotional disorder, no handicap,

Advertising salary: controversial

Reduce resume filter (efforts): hire external recruiters

Coy impress (candidate): overview of the company and benefit of working

Interviewer examine (candidates) objective capabilities and subjective fit (with team)

Policy: Organization monitor, expect employee behavior conform

Procedure: how to be done (with specific items)

Policies: Useful but not to overload employees

Developing police work: with manager (whose items will be affected )

Procedure (articulation): prevent confusion

Procedure (concern): daily operation

Policy & procedure (reflect): ideal functionality of organization

key metrics and performance indicators: determine process reflect organization strategy

Metrics (alignment): with (organization strategy)

Internal training (improve): current job better

Employees (performance measured): how will with (current jobs) and contribute with (growth of cay as a whole)

2nd most valuable asset (after employee): corporate knowledge

Convince need of security: By (qualifying and prioritizing loss potential)

Security awareness program (impact): through courtesy and efficiency by SO

Number of officer required: physical complexity and size of the facility

Number of officer required: number of employees and nature of work

Number of support personnel (depend): size and complexity of SF

Developing security organization (first): identify tasks (required to perform)

Primary function of SO: access control

Officer patrol observe: people, asset and location

Patrols categories: foot patrols, vehicular patrols

Patrols: Systematically, frequently back tracking

Prime tasks of patrol: observation

Visitor escorted by: who invited a visitor

Dealing disturbed person (require): sensitivity

S/O qualification (based): on the duties (in job description)

Initial interview: by a human resource specialist

SO honestly: is obvious (custodians of company)

Difference (life and death): continued alertness

Factor related behavior: Courtesy, restraint, interest

Restraint: Without haste or undue emotion, a / abusive language and force and arguing

Learning SO: ongoing process

Without ethics: the package is incomplete

Greatest liabilities for organization: issuing deadly weapon to SO

Decision to issue (weapon): life safety of SO, expect fatal force

Organization structure: pattern of interactions and coordination

Efficiency SF (depends): adequacy and skill of its supervisors

S/Supervisions (selected): basing on knowledge of the job, abilities (administrative and leadership)

Testing S/operation program: identify residual risk, changes in organization

Vertical models: authority comes from top

Effective manorial (style): acknowledge good performance and objective noting deficiencies

Art of delegation: giving responsibility with authority and making accountable for that authority

Sham rook model (three leafed): professional manager, technician, supplier and part time worker

Network model: flattered, horizontal or open model

Net model (emphasis): on people coming together for particular task

Hybrid SF: proprietary supervisors oversee contract SO

Principle agent: relationship (p/supervisor oversee contract SO

To sell security firm projects: usually reduce costs

Bid specification consist: requirement, wages, benefits, performance expectations.

S/officer primarily liable: for their own conduct

Employing contract organization: verify (existence and adequacy of Insurance coverage)

Security personnel: vital component (asset protection program)

Security personnel: not place as sub operation of another department

Protection of assets: important management function

Develop managing effective A/P program (method): loss prevention, system approach

To be successful (A/P program): current technology, relate security with objective enterprise

Protection of assets (function): in a single organization

benefit (single organization): use system approach, utilize personnel efficiently, possible hire qualified A/P management

Qualified management (attend): with responsibilities, job content and growth opportunities

System approach (cover): entire spectrum protection, neutralize risks to a maximum extent

Protection program (basic requirement): Top official show interest

Important (consideration): setting limitation on authority of protection organization

Limitation (impose): for the protection of protection organization

protection organization act: in a staff or sr4vice capacity to line supervisors

A/P program plan / implement (consideration): anyone with protection organization has a relationship

Protection program (prime objectives): motivate every employee part of protection team

E/employee should (encourage): assume responsibility to protection asset as his own job

Assume responsibility and performing A/P role (ensure): by supervisors at all levels

Central (success A/P program): effective communication

To test (a/p program): feedback from individual at all levels

Methods of obtaining feedback should be (include): in program design of P/A

Methods (feedback): one group from (protection program), another (all other employees)

Feedback (effective techniques): discussion and interviews with e/supervisor

Listening and reacting to feedback: important

Key element in success of A/P: selection of top professional (P/A)

Protection executive (familiar): protection problems, technique

Protection executive (main force) implementation and management of system approach

Delegation of authority and responsibility: by operating head of enterprise

Delegation authority and responsibility (implemented): through issuance of policy

D/A and responsibility (important): P/O operate 24H, 7 days a week

Lack of delegation: a serious limitation on effectiveness

Important performance factor of PO: reporting level of top protection executive

Reporting level (should): be high enough

Reporting level high (why): s/activity not prematurely or improperly terminated or redirected

Indispensable for A/P (program): planning

Manager (no plan): reacts to events already occurred, s/problem which can be avoided

Planning p/o (1st step): determine overall goals and objectives

Planning (p/o): continuing process (as objectives changes or revised)

Planning of p/o (focus): avoidance or control of losses

Planning (should be): practical commitment to obtain results

Planning (flexible): to cope with (unpredictable or unexpected event)

Plans (p/o): related (overall objective / plans of enterprise

Achieving objectives of p/o: through (costs effectiveness)

Primary factor in determining size or existence of A/P program: cost effectiveness to T/Management

Final analysis (A/P) program (measured): in financial terms

Cost effective manager (makes) optimum use of assets and exercise controls over items of costs

Cost – effective in A/P (means): balance expenditure against achieved results and to revise plan

Revise plan (involve) application of critical judgment

Critical judgment (based): complete understanding of the enterprise operations and knowledge of state of the art security

Examining C/E of A/P (first): asses the overall program

Examining C/E of A/P (next aspect): assets protection operation itself

A/P program must (assessed): economically and functionally

Common language in (enterprise): finical number

Senior management (view) all (operations) from a financial perspective

S/professional lack (financial perspective): unable to justify funding

Sales forecast: dollar amount of sales revenue (in a year / Q)

Basic goal (for an corporate organization) to earn the planned profit

To be C/E S/program (consider): major loss events to prevent, incidental cost avoidances and asset (value recoveries)

Major loss events (expressed): as dollars of cost (S/program justification)

Methods of C/E: cost reduction, cost avoidance

Cost of operation (increase): “we have always this way” syndrome

One way to achieve C/E: to avoid costs or expense (through A/P resources)

Every actions in cost avoidance (should): documented and qualified financially

Acceptable technique of C/E: assigning a value or dollar amount to the avoided cost

CE/ actions (generate revenues): through (proof of loss, recovery, establishment of claims or legal cause of actions against parties, non security actions – “bad checks”

Full C/E achievement (require): a formal loss reporting system

L/R system (does): provides (history of dishonesty, theft losses), and basis for effort to asset recovery

Security incident reporting (provides): A data base

S/I database (used): to persuade management, can be utilized as a valuable tool

Dept benefits from S/I database: line management, HR, internal audit, business ethics

Good L/R (provide): a number of statistics (makes quick / assessment & decision)

L/R accomplish (functions): notification of actual suspected dishonesty loss, information (event profile and modus operands), cost of loss for individual loss, accountability for losses, source of information, management control device, basis instituting insurance claims

L/R (benefit): Identify target L/items,, place of exposure, loss trends, recovery loss, apprehension of thieves, indicate countermeasures effective

Loss Reporting (created): for future loss avoidance (in opportunities)

Categories of loss (tracked): most vulnerable asses, when highest probability of loss occur, the locations loss occurred, countermeasures (useful or ineffective), value and frequency of loss rations

Future loss avoidance (identification): carefully analysis (statically vital data)

80-20 rules: 20% of total reported instances of loss, the loss occurrence will represent 80% of the lost value the cost of loss

80-20 rule (applies): spent or eliminating or reducing losses that represent 80% cost of the loss

Loss value / frequency ratios (indicate): countermeasure needed to prevent future losses

Security officer (one element): in a complete protection plan

The activities of SO integrated into plan: through (system approach)

Security officers are: costly

Other element or technique of protection: Hardware and electronics

Duties performed by SO (determines): Scope and nature of training required

SO training requirement (address): Legal aspects, OPS duties, fire arms, admin responsibilities, E/countermeasure, use of force

Training of SO (also based): on capabilities of officer in training

General Security Instruction (given) as soon as SO reports

Specific equipment issues (governed by) the duties performed, the policy of the organization, the statues

Efficiency of SF (depends): on adequacy and skill of its supervisors

SO supervisor personnel (selected): based on (knowledge of the job and demonstrated (admin and leadership abilities)

Rotation of assigned (supervisors): to prevent cliques and ensure familiarity

Contract security (advantages): monitor savings, schedule flexibility and staffing issues

Proprietary / S (advantages): tighter (control + supervision), better tracing, and employee loyalty

Business principles dictate SO (deployment): only where required and most effective

Deployment of SO (guided) by: a rational and objective B/criterion

After criterion (next important tasks): scheduling, assignment of SO are accomplished in C/E manners.

Number of officer (required): complexity of facility, number of employees, character of work completed, number of entrances and hours open, number of patrols to protect facilities, number of escort and special assignments

40H/W, 24H/D, 7 D/W (required): 4.2 officers

Compensate (sick, vacation, h/ leave): 4.5 officers

A security officer post (defined): any location or combination of activities

SO post (key concepts): a location or combination of activities, necessary human being, training and competence required to accomplish activities

Human being concept (means): particular characteristics and reactions required

Post (common set of environmental concern) working space, heat, light and noise

Prolonged elevation of heat levels: cause (rapid loss of vigilance and result becoming drowsy)

SO sleeping on post: may be extenuating circumstances

CCTV (can): enhance and extend the effectiveness of SO

Watching TV monitors: passive activity, result (hypnotic effect)

In designing CCTV console (consider): Ergonomics

Design system should (incorporate) display and annunciation features

Sequential display of camera images (reduce): number of monitor and hypnotic effect

Video motion detector (sense): a changed scene in a camera image and a least SO

High efficiency anti-reflecting coating (on glass): eliminate the glare factor as a performance obstacles

Monotony of work (lead): gradual loss of alertness

Road hypnosis: sleep walking

Operator perform efficiency (peak): not more than 30+60 minutes without a relief

Proficiency in a skill (remain): incorporate (random performance tests and feedback routine into duties of post)

Physiological phenomenon (are): nature cyclical decrease relative lack of external stimulus, length of time on duty and repetitive monotonous tasks

Prohibition (more than 1 shift in a day): prevent (unnecessary disruptions to the human circadian biorhythm)

Basic tool (in hiring process): an (accurate and detailed Job description)

Complete job analysis: provide (documentation to support qualification requirement)

Alleviate the stress (factors): through (job modifications technique)

If performance discrepancies not due to (physical or psychological stress): a training problem

Skill Deficiency (Corrected): by additional training

On the job instruction: a basic training technique for SO

Adequate functional job analysis: possible (identify specific skill deficiencies)

Skill performance (deteriorate): no opportunity to practice skill to receive feedback

SO not: overqualified for the job

Highly qualified SO in routine job: may (engender psychological job stress and performance deficiencies

Frustration and boring aspects job (induce): non performance

Adequate job analysis (allows): to begin implement changes to job performance

Decisions to train (based on): favorable return on training investment

Increase job content (helps): to overcome psychological stress factors

Main effort to (increase job content): reduce sense of isolation and positive and timely feedback.

Daily but interactions minor / positive between SO & employee: diminish (latest hostility, sense of alienation)

Ultimate solution (performance problem): training

Performance failure (due to): undesirable behavior patterns

Key to improve effectiveness SO (operations): remove or reduce obstacles that hinder optimum job performance

Communication dependence with SO: written instructions

Important written instructions: post orders

Criteria (PO): one subject, brief, simple terms, indexed

Partial solution to (performance ratings): regular assessment and recording (after every post visit)

Performance assessment (include): personal appearance and condition of officer, condition of post, availability and condition of personnel, post equipments, quality of response to training questions, quality of response to actual situation

Central to the protection mission: observations by security officer

SO report (forms): force positive statements

Central report (document): security log

Security log: records (events affecting facility protection)

Use of report & logs: has (historical value, audit opportunities and value for G/management of facility)

SL is authorizing source to establish: whether condition, receipt T/call, time when event occurred, presence of particular people in facility.

SR and logs admissible (legal proceedings) because (entries made in the regular course of business)

To qualify for (legal proceedings): be (regularly maintained, maintained by a person as part of his regular duties)

Work should be divided: According to logical plan

Responsibility cannot be given: without delegating commensurate authority

5 primary ways to divide work: purpose, process or method, clientele, time & geography

Failure to explain organizational structure: unnecessary confusion

Major contributor to ineffective job performance: confusion

Unity of command principle: employee should be under the direct control of only one immediate

Span of control principle: one supervisor can effectively control only a limited number of people (ideal 1:3, good 1:6, acceptable 1:12)

Functional authority: delegated by a senior executive to a security manager

Security management failure: delegation of responsibility with accompanying authority

Staff duties (supportive in nature): security manager advises senior executives

Line duties (operational in nature): security manager carries out security operations

Line supervisor: ultimate responsibility for the internal security in a department

Line authority: security personnel to be supervised by security management

Line function: a direct relationship between a supervisor and subordinate

Work breakdown structure (WBS): breaking down a project into manageable parts

CSO’s role: Managerial, administrative, preventive, investigative

Effective communication: central to the success of any asset protection program

Management skills (general): conceptual, interpersonal, technical & political

Key asset element: selecting top professionals to design, implement and manage the asset protection program

Essential: knowledgeable, skilled executive

Important: Development policy

4 specific monument management functions: planning, organizing, leading and controlling

Management roles: interpersonal, informational and decisional

Organizational structure: Horizontal plan & vertical plan

Horizontal plan: Indicates division of areas of responsibility

Vertical plan: defines levels of authority

Functional authority: When a senior executive delegates par of his authority to a security director

ISO (International Organization for Standardization): Central point where stands bodies from around the world and the organizations that participate with them – develop standard jointly

American National Standard Institute (ANSI): Administrator and coordinator of the US private sector voluntary standardization system

Underwriters Laboratories (UL): For alarm products and installation (this system assists insurers in setting premiums for customers)

The National Fire Protection Associations (NFPA): Standards for fire protection equipment

The American Society for Testing and Materials (ASTM): nonprofit organization providing a forum for produces, consumers, government and academia to meet to write standards for materials

ISO/TC 223: Societal Security (security, business continuity, crisis management, disaster management and emergency response)

Assets: Resource of value requiring protection

3 types of assets: Tangible, intangible and mix

Valuing assets: through the use of dollars, by using consequence criteria and by policy

Costs: Direct and indirect

Probability of occurrence: Likelihood of an adversary event

Factors affecting PO: physical, social and political environment, historical experience, procedures and process and criminal capabilities

Annual Loss Expectancy (ALE): ALE = 10 (f+i-3)/3

Elements affecting frequency estimation: access, natural disaster, environmental hazard, facility housing, work environment and value

3 stage approach of assessing criticality: prevention control and recovery

Risk: Uncertainty of financial loss

Risk VS Peril and Risk VS Hazard: Risk should not be confused with perils, which are the causes of risk- such things as fire, flood, and earthquake. Nor should risk be confused with a hazard, which is the contributing factor to a peril. Almost anything can be a hazard- a loaded gun, a bottle of caustic acid, a bunch of city rags, or a warehouse used for storing highly flammable products, as an example.

Risk (classification): Personal (people assets), property (material assets), and liability (legal issues)

Risk analysis: Identify the assets in need of protection

Identify the kinds of risks (or threats)

Determine the probability of the identified risks occurring

Determine the impact or effect on the organization in dollar values

Major resource (for performing RA): trained manpower

Quantitative RA: assigns the probability of occurrence of identified hazards and determines their impact or consequence, usually resulting in a value such as Annual Loss Expectancy (ALE) or Annual Cost

Qualitative RA: more a kin to risk assessment or vulnerability analysis, concentrates less (or not at all) on probability and looks at threats, vulnerability

Risk Assessment VS Risk Management: Using probabilistic risk assessment is more formal, scientific, technical, quantitative, and objective when compared to risk management, which involves value judgment and heuristics and is more subjective, qualitative, societal, and political

Risk management (four basic steps): identification of risks, analysis and study of risks, optimization of risks, ongoing study of the security program

Cost/Benefit analysis (three basic criteria): cost, reliability and delay

RA vs VA: VA is process is part of the larger risk assessment process

3 phases of VA: planning, the VVA and reporting & using the result

VA (protection system): facility characterization, threat definition, target identification

Threat definition (methodology): List the information needed to define the threat

Collect information on the potential threat

Organize the information to make it usable

Insurance (definition): transfer of risk from one party (the insured) to another party (the insurer), which the insurer is obligated to indemnify (compensate) the insured for economic loss caused from an unexpected event

Indemnity: Protection against future lost

Large number of policy holders: crates a shared risk

2 variables for Insurance rate: the frequency of claims and the cost of each claim

2 forms of control: competition among insurance companies & government regulations

Financial health of an insurance company: Company rating (A+ or better)

2 broad categories of insurance: government and private

Private insurance industry in USA: property and liability, insurance and life and health insurance

Commercial Package Policy (CPP): multiple coverage in single policy, fewer gaps in coverage, lower premiums, because individual policies are purchased and convenience.

2 basic protection against crime losses: fidelity and surety bonds and burglary, robbery and theft insurance

Bond: Legal instrument whereby one party (the surety) agrees to indemnify another party (the oblige)

Bonding contracts involves 3 parties: Insurance contract involves two parties

Insurance is easier to cancel: Bond is not easy to cancel

Surety bond: Three party instrument between a surety (insurance company), the contractor and the project customer

Surety bond: compensation because of performance failure

Insurance: Transfer of risk from one party to another

Fidelity bonds: Employee be investigated by the bonding company to limit the risk of dishonesty

Contract construction bond: common surety bond

Fiduciary bond: Person appointed by the court to supervise the property of the others will be trustworthy

Litigation bond: Specific conduct by defendants and plaintiffs

Bail bond: Ensures a person will appear in the court

Burglary Insurance claim: Requires the unlawful taking of property from a closed business that was entered by force

10% of loss to property: from ordinary crime is insured

Fire policy: First kind of insurance developed

Factors influence fire insurance: ability of the community’s fire alarm, fire department and water system to minimize property damage once a fire begins

Class 1 community: greatest suppression ability

Class 10 community: least ability

Installing sprinkler system in the building: Produce ROI

Business Income Insurance (business interruption insurance): indemnifies the insured for profits and expenses lost because of damage to property from an insured peril

Bid Bond: Guarantees the bidder on a contract will enter into the contract and furnish the required payment and performance bond

Performance bond: Indicates that the company has necessary skills and capabilities to carry out the required work

Payment bond: Guarantees payment from contractor to person who furnishes labor, materials etc.



Comments

Popular Posts