security

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/264

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

265 Terms

1
New cards

What does the Private Security and Investigative Services Act (PSISA) regulate?

It governs Ontario's security and investigations work roles, actions, and responsibilities in the security industry.

2
New cards

When were most regulations of the PSISA implemented?

In 2007.

3
New cards

List the three Ps of Protection under the PSISA.

  1. People

  2.  Property

  3. Proprietary Information (confidential data).

4
New cards

What must security guards carry while on duty?

Their licenses, including for plain-clothes security guards.

5
New cards

What is a key principle regarding documentation in security?

If you did not write it down, it did not happen.

6
New cards

What are the basic responsibilities of physical security?

Ensuring the physical security of people, property, and private information, and reducing the risk of loss to assets.

7
New cards

What are the two basic components of physical security?

Soft physical security (rules and procedures) and hard physical security (physical barriers and devices).

8
New cards

What is the rule of gates in physical security?

If you don't need it, keep it locked and check it.

9
New cards

What are the steps in the physical security and threat assessment process?

  1. Identify potential threats. 2. Expose loss events. 3. Assess probability and impact. 4. Determine countermeasures.

10
New cards

What are the objectives of barriers in physical security?

Define property boundaries, deter unauthorized entry, delay entry for checks, and channel flow of people.

11
New cards

What are the types of threats in physical security?

Natural threats (weather-related), intentional threats (crimes), and inadvertent threats (accidents/errors).

12
New cards

What does risk acceptance mean in risk mitigation?

Acknowledging potential loss but deciding it is not worth the cost to avoid it.

13
New cards

What is risk avoidance in risk mitigation?

Eliminating hazards or activities that could negatively affect the company's assets.

14
New cards

What is risk transfer in risk mitigation?

Shifting a pure risk from one party to another, such as purchasing insurance.

15
New cards

What is risk reduction in risk mitigation?

Implementing measures to reduce the frequency or severity of losses, like safety inspections.

16
New cards

What is the goal of layered protection (defense in depth)?

To deter, detect, delay, and defend against threats to assets.

17
New cards

What is the importance of surveillance techniques in security?

To monitor activities and detect potential threats, using covert or overt methods.

18
New cards

What is the purpose of patrols in security?

To ensure safety and security of people and property.

19
New cards

What is the significance of documentation and report writing in security?

It provides a record of incidents and actions taken, essential for accountability.

20
New cards

What is the role of alarm response in security?

To react to alarm signals and investigate potential security breaches.

21
New cards

What are the ten recommendations of Aggressive Protection?

They include knowing your area, verifying information, checking barriers, and focusing on prevention.

22
New cards

What is the significance of understanding the physical security process?

It helps in identifying vulnerabilities and implementing effective security measures.

23
New cards

What is the impact of natural threats on security planning?

They require evaluation based on historical trends and environmental factors.

24
New cards

How can security professionals prepare for inadvertent threats?

Through preparation, education, and awareness of potential risks.

25
New cards

What is overt surveillance?

Surveillance that is visible to the public, such as a uniformed security guard on foot patrol.

26
New cards

What is covert surveillance?

Surveillance that is hidden from the public, often using hidden cameras or other discreet methods.

27
New cards

What are some activities that security teams aim to deter?

Trespassing, damage to property, drug dealing, arson, shoplifting, fighting, and break-and-enter.

28
New cards

What strategies do security teams use to deter unauthorized activities?

Installing locks, CCTV systems, tall fences, and enforcing property rules.

29
New cards

What types of hazards should security teams be looking to detect?

Fire hazards, malfunctioning equipment, suspicious vehicles, tampering signs, and disorderly conduct.

30
New cards

What is the purpose of delaying unauthorized activities?

To allow security, police, or bystanders to intervene before a crime occurs.

31
New cards

What is the main goal of a security program?

To deny unauthorized entry or activity within assigned properties.

32
New cards

What are mobile patrols?

Patrols conducted in a marked vehicle to cover larger areas quickly.

33
New cards

What are foot patrols?

The most common type of patrol, allowing for close inspection and better public relations.

34
New cards

What are fixed post patrols?

Patrols that create a strong security presence at specific locations like gatehouses or lobbies.

35
New cards

What is a visual patrol?

CCTV monitoring conducted by the Security Operations Center Dispatcher to support ground patrols.

36
New cards

When should patrols be conducted?

At irregular times to prevent predictability and counter-surveillance.

37
New cards

What items should a security guard have before starting a patrol?

A site floor plan, flashlight, radio, weather-appropriate clothing, and a cell phone.

38
New cards

What should security guards check for in vacant suites?

Signs of intrusion or theft.

39
New cards

What should be checked in washrooms during patrols?

Unauthorized activity, leaks, and unusual occupancy.

40
New cards

What are common hazards to look for during floor-by-floor checks?

Litter, spills, signs of break-ins, broken light bulbs, and unlocked doors.

41
New cards

What types of alarms are there in security systems?

Intrusion alarms, fire alarms, and special purpose alarms.

42
New cards

What is the role of central alarm stations?

To monitor alarms from an off-site location.

43
New cards

What are contact switches used for in alarm systems?

To detect unauthorized entry through doors and windows.

44
New cards

What is the purpose of pressure devices in alarm systems?

To detect unauthorized access through pressure-sensitive mats.

45
New cards

What do motion detection systems use?

Passive infrared, microwave, or ultrasonic technology to detect movement.

46
New cards

What is the significance of layered protection in security?

It involves using multiple security measures to create a more effective defense.

47
New cards

What is the importance of risk mitigation strategies in security?

To minimize potential risks and enhance the safety of the property.

48
New cards

What is the purpose of Asset Protection in security professions?

To safeguard assets from theft, damage, or loss.

49
New cards

What are Risk Mitigation strategies?

Techniques used to reduce the potential impact of risks in security operations.

50
New cards

What does Layered Protection (Defense in Depth) refer to?

A security strategy that uses multiple layers of defense to protect assets.

51
New cards

What is the difference between Covert and Overt surveillance?

Covert surveillance is hidden and discreet, while overt surveillance is visible and obvious.

52
New cards

What is the primary purpose of patrols in security?

To monitor and ensure the safety of an area or property.

53
New cards

What is Basic Alarm Response?

The initial actions taken when an alarm is triggered to assess and respond to a potential threat.

54
New cards

What is the focus of Section A in the course?

Use of Equipment in security operations.

55
New cards

What are some key functions of Computer Use in security?

Access control, parcel control, special occurrence reports, and video surveillance system monitoring.

56
New cards

Why is Telephone Etiquette important in the security industry?

It facilitates effective communication with clients, vendors, and associates.

57
New cards

What should be done when answering a business phone?

Answer within three rings with a positive greeting and state your name and the business name.

58
New cards

What is a best practice when placing a call?

State your name before asking for the person you are calling.

59
New cards

What should you avoid when answering the phone?

Eating, chewing, or drinking, as it can affect clarity and professionalism.

60
New cards

What is the protocol for transferring a call?

Inform the caller before transferring and confirm the availability of the person receiving the call.

61
New cards

What is the role of Two-Way Radios in security?

To facilitate communication among security personnel and contractors.

62
New cards

What are common errors in radio communication?

Not pausing before talking, forgetting to press the button, and mumbling.

63
New cards

What is the policy regarding personal device use in security?

Personal cell phones are generally prohibited during work hours, except for emergencies.

64
New cards

What is the purpose of notebooks in security reporting?

To document field notes that can serve as evidence in court.

65
New cards

What can reporting software help security guards with?

Writing daily occurrence reports, managing access control, and tracking maintenance requests.

66
New cards

What is Key Management software used for?

To keep keys secure and organized, recording all key transactions.

67
New cards

What is the significance of a positive closure when ending a phone call?

It leaves a good impression and shows respect for the caller's time.

68
New cards

What should you do if you do not know the answer to a caller's question?

Say, 'I'll check on that for you' instead of 'I don't know.'

69
New cards

What is the recommended distance to hold a phone for clarity?

Two fingers from the mouth.

70
New cards

What should you do if a call needs to be put on hold?

Ask for permission first and offer the option to leave a voicemail.

71
New cards

What is the recommended action if a radio transmission will take longer than 30 seconds?

See someone in person or use the phone instead.

72
New cards

What is the importance of being alert and vigilant in security?

To ensure safety and respond effectively to potential threats.

73
New cards

What is the function of a Video Surveillance System (VSS)?

To monitor and record activities in a designated area for security purposes.

74
New cards

What does the automated notification system do?

It sends notifications to management and residents whenever a key is picked up or returned.

75
New cards

What feature does the touchscreen interface provide?

It allows for easy tracking of keys, showing whether they are in or out and who has them if they are out.

76
New cards

Who are some types of guests that security personnel may manage?

Visitors, employees, shoppers, contractors, real estate agents, emergency personnel, and Elections Canada personnel.

77
New cards

What should security personnel do if someone challenges access control rules?

Remain firm in proportion to the level of resistance while maintaining professionalism.

78
New cards

What is required of contractors conducting work on the property?

They are usually assisted and directed by security and must sign in, with prior written notice of the work provided.

79
New cards

What do real estate agents typically present to security for access?

A business card, which is documented along with the suite they are showing and their times of arrival and departure.

80
New cards

What is the purpose of lockboxes for real estate agents?

They allow agents to access properties for sale without needing to rely solely on security personnel.

81
New cards

What rights do Elections Canada personnel have regarding access?

They have the right to enter common areas and solicit votes door to door during elections.

82
New cards

What does CCTV stand for?

Closed Circuit Television.

83
New cards

What is an advantage of CCTV?

It is not accessible from the exterior of the property, making it secure from external hacking.

84
New cards

What is a disadvantage of CCTV?

It cannot be accessed remotely, which can be inconvenient.

85
New cards

What does VSS stand for?

Video Surveillance System.

86
New cards

What is the primary purpose of video surveillance systems?

To help prevent crimes and provide evidence for investigations.

87
New cards

How does video surveillance protect company property?

It records incidents of vandalism or theft, aiding police investigations.

88
New cards

In what way does video surveillance protect people?

It records criminal activity and monitors visitor access, ensuring safety.

89
New cards

How can video surveillance improve productivity?

It allows managers to monitor guard performance and employee adherence to safety rules.

90
New cards

What role does video surveillance play in record keeping?

It helps verify customer claims and interactions, providing evidence in disputes.

91
New cards

What is one benefit of having a surveillance system?

It increases the sense of security for people in the building.

92
New cards

How can surveillance systems discourage crime?

The presence of cameras can deter vandalism and theft before they occur.

93
New cards

What is a caution regarding surveillance systems?

Employee privacy should be respected, and footage should only be reviewed when necessary.

94
New cards

How does video surveillance facilitate investigations?

It provides undeniable proof of events with timestamps and can include audio recording.

95
New cards

What is the impact of knowing one is being recorded on employee behavior?

It tends to reduce time-wasting and can improve overall productivity.

96
New cards

What is one major benefit of installing security cameras?

They deter crime by making potential offenders think twice about their actions.

97
New cards

How can security cameras affect insurance premiums?

Having a video surveillance system can dramatically reduce insurance premiums by lowering the risk of claims.

98
New cards

What role do security cameras play in monitoring activities?

They help monitor suspicious or prohibited activities by providing real-time surveillance.

99
New cards

How can security cameras assist in legal situations?

They gather evidence through high-quality video and audio recordings, which can clarify events during disputes.

100
New cards

What is a significant drawback of security cameras related to privacy?

They can lead to privacy concerns, as employees may object to constant surveillance without consent.