The pratice of obtaining information that is considered secret or confidential without permission of the holder of the info
What is Espionage
This key strategy involves how most people tend to protect area that they feel is their own, and have a cetain amount of respect for other's
What is territoriality?
These are the two types of risks
What is pure and dynamic risk?
The most popular method of drug testing
What is urine sampling?
This is unwelcome sexual advances, requests for sexual advance, requests for sexual favors and other verbal or physcial contact of a sexual nature
What is sexual harassment?
financial fraud where criminals repeatedly steal small amounts of money from many accounts over time
What is salami fraud
This key strategy is using physical design to guide and control access to a space
What is access control?
The acronym for UCR
What is Uniform Crime Reporting?
The first line of defense
Hiring well
While law enforcement officers have to read these rights if they intent to interrogate however some jurisdiction state security personnel don't.
What are miranda rights?
Computer crimes are typically prosecuted under such criminal status/laws
What is Larceny/fraud?
This key strategy is almost entirely based off of the fact that criminals do no want to be seen
What is natural surveillance?
This factor of risk analysis is about where and how losses occur
What is vulnerability?
The minimum amount of people you should have for Opening procedures.
What is two?
This type of communication can be just as informative as verbal communication.
What is non-verbal communication?
the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
What is phising?
This key strategy encourages legitmate activity in public spaces
What is activity support?
This is the process of identifying and prioritizing risks to a business
What is risk assessment?
This procedure is limiting the number of persons having keys and establishing a master list of all existing keys and whom they have been assigned to.
Documentation of who has possessed the evidence, and when, since possession of it.
What is chain of custody?
This federal law prohibits intentionally accessing a computer without authorization
What is the computer fraud and abuse act?
The premise that the more valuable an asset is, the more protection it needs
What is concentric zone theory?
Identifies the most important risks quickly by assigning relative values to assets,risks,control and effects.
What is qualitative risk assessment?
Type of bond that protects a company from losses that result directly from dishonest or fraudulent acts of employees
What is a fidelity bond?
The foundational concept in forensic science, states that whenever two objects come into contact, they will exchange traces of each other.
What is locard's principle?