cyber crimes
Physical Controls
Risk
Procedural Controls
Investigating,Reporting and testifying
100

The pratice of obtaining information that is considered secret or confidential without permission of the holder of the info

What is Espionage

100

This key strategy involves how most people tend to protect area that they feel is their own, and have a cetain amount of respect for other's

What is territoriality? 

100

These are the two types of risks 

What is pure and dynamic risk?

100

The most popular method of drug testing

What is urine sampling?

100

This is unwelcome sexual advances, requests for sexual advance, requests for sexual favors and other verbal or physcial contact of a sexual nature

What is sexual harassment?

200

financial fraud where criminals repeatedly steal small amounts of money from many accounts over time

What is salami fraud

200

This key strategy is using physical design to guide and control access to a space

What is access control?

200

The acronym for UCR 

What is Uniform Crime Reporting?

200

The first line of defense 

Hiring well

200

While law enforcement officers have to read these rights if they intent to interrogate however some jurisdiction state security personnel don't.

What are miranda rights?

300

Computer crimes are typically prosecuted under such criminal status/laws

What is Larceny/fraud?

300

This key strategy is almost entirely based off of the fact that criminals do no want to be seen

What is natural surveillance?

300

This factor of risk analysis is about where and how losses occur

What is vulnerability?

300

The minimum amount of people you should have for Opening procedures.

What is two?

300

This type of communication can be just as informative as verbal communication.

What is non-verbal communication?

400

the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

What is phising?

400

This key strategy encourages legitmate activity in public spaces 

What is activity support?

400

This is the process of identifying and prioritizing risks to a business

What is risk assessment?

400

This procedure is limiting the number of persons having keys and establishing a master list of all existing keys and whom they have been assigned to.

What is key control
400

Documentation of who has possessed the evidence, and when, since possession of it.

What is chain of custody?

500

This federal law prohibits intentionally accessing a computer without authorization

What is the computer fraud and abuse act?

500

The premise that the more valuable an asset is, the more protection it needs

What is concentric zone theory?

500

Identifies the most important risks quickly by assigning relative values to assets,risks,control and effects.

What is qualitative risk assessment?

500

Type of bond that protects a company from losses that result directly from dishonest or fraudulent acts of employees

What is a fidelity bond?

500

The foundational concept in forensic science, states that whenever two objects come into contact, they will exchange traces of each other.

What is locard's principle?