Term
Why are internal info systems attacks a people problem? |
|
Definition
Because of the psychological profile of IT employees:
Tend to be introverts
Prefer to work independently
Less likely to handle work stress in constructive manner
May show disgruntled behavior online rather than by less destructive means
|
|
|
Term
Internal Affairs can take the form of ? |
|
Definition
employee theft
pifredge
embezzlement
|
|
|
Term
Two major causes of employee theft |
|
Definition
Personal problems
The enviornment |
|
|
Term
What is the "Formula" for employee they? (Cressey)
|
|
Definition
motivation+opportunity+rationalization=theft |
|
|
Term
Differential association
(Sutherland) |
|
Definition
Superiors and colleagues in a company are probably more important determinants of crime than is the personality of the individual
(Everyone in your work is dishonest, making you want to and do) |
|
|
Term
Three ways to remedy internal property theft |
|
Definition
Set up inventory system
Mark property
Use metal detectors |
|
|
Term
What is a an intergrated system? |
|
Definition
the control and opporation by a single oporator of multiple systems whose percetption is that only a single system is performing all fuctions. |
|
|
Term
Types of Biometric security |
|
Definition
fingerprint scan
hand scan
iris scan
retina scan
voice scan
physical action and writing
facial scan |
|
|
Term
What is Dual technologies? |
|
Definition
a combination of different types of intrusion systems |
|
|
Term
Types of unauthorized entry |
|
Definition
forced entry
smash and grab attacks
unforced entry-nonlocked doors
surrepticious- people hinding in bathrooms
|
|
|
Term
Five countermeasures for external theft |
|
Definition
deter
detect
delay
deny
destroy |
|
|
Term
|
Definition
Crime prevention through eviornmental protection
better lighting
less shrubery
retrofit buildings |
|
|
Term
Situational Crime Prevention
(SCP) |
|
Definition
managerial and user behavior factors that affect opportunities for criminal behavior in a specific setting for specific crime |
|
|
Term
|
Definition
individuals calculate outcomes and inputs including the potential pay off, risk and needs |
|
|
Term
Routine Activities Theory |
|
Definition
day-to-day activities of people result in the convergeance of motivated offenders and victims |
|
|
Term
|
Definition
focuses on the activity of the victim, as a contributing factor in criminal acts and victimization |
|
|
Term
|
Definition
an outer boundary and the first line of defense against unauthorized acces |
|
|
Term
Five types of barriers that prevent theft
|
|
Definition
natural
structural
human
animals
energy |
|
|
Term
Types of protected windows |
|
Definition
laminated glass
acrylic windows
burglar resistant
poly carbonate windows(plexiglass)
electronic security glass |
|
|
Term
Intrusive detection systems |
|
Definition
point detection
area protection
perimeter protection |
|
|
Term
What are the two major purposes of lighting |
|
Definition
create psychological deterant
enable detection |
|
|
Term
three types of light measure
|
|
Definition
lumens
illumenance
foot candle power |
|
|
Term
|
Definition
activities performed by personel to furter the goals of security and loss prevention
|
|
|
Term
|
Definition
manufactured items that increase security |
|
|
Term
Five rules toward making a wise purchasing decesion |
|
Definition
buyer beware-get what you pay for
properly evaluate the needs of the organization
aquire info and know state of the art
analyze advantages and disadvantages
avoid panic buying |
|
|
Term
client interested in hiring a Loss Prevention Consultant will be involved in 3 specific phases |
|
Definition
Selection
direction
evaluation |
|
|
Term
|
Definition
purchasing from outside companies, services that were previously performed in-house |
|
|
Term
Six basic question to ask during an investigation |
|
Definition
Who
What
Where
When
How(most important)
Why |
|
|
Term
Types of investigations in the private sector are? |
|
Definition
applicant background
criminal office
computer crime
accidents
fire and arson
neglect and civil liability
insurance
labor matters
due dillgence
|
|
|
Term
Whats the difference between Overt and Undercover? |
|
Definition
|
|
Term
What are the three classifications of evidence
|
|
Definition
Direct
Circumstantial
Hearsay |
|
|
Term
|
Definition
directly proves of disproves a fact without drawing an inference |
|
|
Term
What is circumstantial evidence? |
|
Definition
indirectly proves or disproves a fact and an inference must be made |
|
|
Term
|
Definition
Second-hand information or what someone heard |
|
|
Term
Know the difference in interrogation and interview |
|
Definition
|
|
Term
Strategies during an interview |
|
Definition
ask open ended questions
maintain silence
build up interveiwee memory
test honesty |
|
|
Term
Strategies during interrogations |
|
Definition
discuss seriousness of incident
request story several times
appeal to emotions
point out inconsistancies in statements
confront the interveiwee with some evidence(false or true) |
|
|
Term
|
Definition
|
|
Term
Investigative leads can include? |
|
Definition
scene of the loss
evidence
victim
motive
witnesses
informants |
|
|
Term
|
Definition
act of watching or observing an individual |
|
|
Term
|
Definition
is a pretrial disovery method whereby the oposing party askes quesitons of the other party under oath while a word-for-word transcript is recorded |
|
|
Term
|
Definition
the recording, sorting, summarizing, reporting and interpreting data related to business transactions |
|
|
Term
|
Definition
the examination or checking of something with the purpose of which is to uncover deviations |
|
|
Term
Importance of accountability |
|
Definition
key to survival strategies |
|
|
Term
Private securities litigation reform act |
|
Definition
requires CPAs who audit publicy help companies to take steps to detect fraud |
|
|
Term
Two areas that auditors should dilegeantly work to detect |
|
Definition
financial reporting fraud
missappropriation of assets |
|
|
Term
|
Definition
measuremnt of the frequency probability and severity of lasses from exposure to threats or hazards |
|
|
Term
|
Definition
make the most efficient before the loss arrangement for an after the loss continuation of business |
|
|
Term
Factors that influence roles of risk management |
|
Definition
top management
external influences
nature of business
copporate developments
characteristics of risk management |
|
|
Term
5 steps in the risk management process |
|
Definition
risk identification
quantative analysis
evaluate treatment options
implementation
monitor and adjust |
|
|
Term
5 tools to deal with risk |
|
Definition
risk avoidance
transfer risk
risk abatement
risk spreading
risk assumption |
|
|
Term
insurance rates are dependant of two variables |
|
Definition
frequency of claims
the cost of each claim
|
|
|
Term
two forms of control for insurance companies |
|
Definition
comptetition among insurance agencies
government regulations |
|
|
Term
two types of prevention against crime losses |
|
Definition
fidelity and surety bond
burglary, robbery and theft insurance |
|
|
Term
|
Definition
requires employee to be investigate to limit the risk of dishonesty for the insured |
|
|
Term
|
Definition
agreement providing for compensation if there is a failure to preform specified acts within a certain period of time |
|
|
Term
|
Definition
a legal instrument whereby one party(surety) agrees indermnify another party(the obligee) of the obligee incures a loss from the person bonded(the principle or obligor) |
|
|
Term
|
Definition
a comprehensive managed effore to prioritize key processes, identify signifigant streats to normal operation and plan mitigation strategies to ensure effective and efficient organizational repsonse to the challenges that surface during and after a crises |
|
|
Term
7 step methodology for business continuity |
|
Definition
risk assessment report
business impact analysis report
disaster recovery plan
business recovery plan
business resumption plan
contingency planning
crises management |
|
|
Term
Five disciplines of emergency management |
|
Definition
mitigation
response
recovery
preparedness
communications |
|
|