You are on page 1of 3

Security- Freedom from fear Threats to integrity- breaches to company’s

trade secrets
securus- freedom from anxiety
securitas -feeling no care/ apprehension Threats from intrusion- unauthorized access to
the installation
Computing security- both theoretical actual
computer Threats to business continuity- attacks can be
in many form of natural resources
Computer security- addresses enforcement
Terrorism- force or violence against person or
Data security- kept safe from corruption property for purposes of intimidation

Application security- encompasses measures Improvised explosive devices- homemade


taken to prevent exception bombs

Information security- protecting information Firearms- any lethal barreled weapon

Network security- consists of the provisions Bladed items- weapons in the hand of malicious
made in an underlying individual

Physical security- prevent or deter attackers Postal devices- most common means of criminal
from accessing a facility attack

Shopping center security- concern with Chemical threats - strong, deleterious effect on
protection of store the human body

Airport/seaport security- techniques and method Biological threats- pathogens that cause disease
protecting airport and illness in infected humans

Home security- protecting residential homes Radiological and nuclear threats- terrorist
device
Industrial security- business group engaged in
industries Improvised incediary device- device designed to
destroy produce fire
Hotel security- hotels where its properties are
protected Grenades- small hand- held anti personnel
weapon designed to be thrown
Bank security-concerned with bank
Risk- possible event which could cause a loss
School/ campus security- concerned with the
protection of student Threat- action or method that triggers a risk

International security - taken by national and Vulnerability- state of being open to injury or loss
international organization
Assessment- process of evaluating
National security- cherish
Defense in depth- series of defense mechanisms
Human security- emerging paradigm for
understanding global vulnerabilities Target hardening- comparable to defense

Financial security- applied for the protection of Countermeasure- way to stop a threat
fungible
Mitigation- reducing risk of loss
VIP security- protecting top ranking officials
Security management- proper utilization of
Homeland security- focus on the protection and resources in a security organization
vital entities
Planning- looking a head
Threats against persons and properties-
possibility of physical harm or injury Organizing- well organized

Threats to identity- impersonating / cyber users Commanding- giving orders


or electronic device- based attack or intrusion
Coordinating- harmonizing of activities in
Threats to confidentiality- against wireless organization
communication
Controlling- carried out in conformity with the
plan
Execution and control activities - predicated on
Division of work- specialization of the workforce all of the previous components in the management
increase their accuracy and speed system

Authority and responsibility- accompanying Monitor and security reporting- upon effective
power or authority gives the management two ways communication

Discipline- about obedience/ core values Review- critically debrief the plan in order to
determine strengths
Unity of command- employee should received
orders from one manager Learning- effective processes for learning lessons
will enable an organization
Unity of direction- about focus and unity
Reporting to top management- feedback to top
Subordination of individual interest- personal management
interest are subordinate
Manpower- people as resources
Renumeration- compensation
Money- driving force to any business
Degree of centralization- decision making
process Machineries- devices or tools to aid

Scalar chain- hierarchy present itself Material- raw material

Order- they can function properly in an Methods- standard and procedures techniques
organization
Market- transaction
Equity- treated kindly and equally
Minute- the management of time

Stability of personnel tenure- in balance with the Morale- motivation of people


service that is provided from the organization
Matter- data and information management
Initiative- employees should be allowed to
express new idea Data- information are translated into a form that is
efficient for movement
Esprit de corps- management should strive for
the involvement and unity of the employees Measure- internal control system

Top level managemnet- usually made up of Functional manager- responsible for just one
board of directors organizational activity

Middle level management- concerned with the General manager- responsible for the operations
execution of the policies of more complex units

Lower level management- subordinates The visionary - listen to the ideas


departmental head
The coach- sports coach
Credibility and integration of personnel-
corporate security personnel The sensitive boss- genuinely concerned with
the emotional
Policies objectives and tasks- there should a
single security The democratic boss- easiest types of manager
to work
Threat, vulnerability and security risk
assessment- risk assessments should take into The commander- wants the job to be done on
consideration a wide range of elements beyond time
physical security threats
The pacesetter- highly energetic
Controls- security controls may include physical
protection measure Food security- ready supply and access

Security risk register- should facilitate ownership Home security normally- security systems used
and management of security risks on property used as a dwelling

Planning and resourcing - effective planning


consider to the address targets National security- territory economy
Socio political stability- state of the achievement Engagement- respond to all and or any threat
of peace and harmony within their jurisdiction

Territorial integrity- assurance of permanent Task driven- purpose of satisfying the


inviolability of the national territory requirements of the client

Economic solidarity and strength- it is the Risk management- development s that may
continuous pursuit of a free-market economy threaten the resilience and continued survival of a
through entrepreneurship based on social corporation
conscience
Business continuity- corporate function that
Ecological balance- pertains to the effective overseas and manages the close coordination of
conversation of natural environment in the face of all functions within the company that are
industrial and agricultural expansion and concerned with security
population growth.
Business security - security risks have become
Cultural cohesiveness- upholds that the lives of more complex
people are ruled by a common set of values and
beliefs grounded on high moral and ethical Efficiency- managing a business comes with an
standards abundant amount task

Moral and spiritual consensus- promotes a Centralization- integrated security system allow
national vision inspired and manifested in people s business security operation to become more
word and deeds centralized

External peace- constructive and cordial relations Loss prevention- no matter what kinds of
with all nations which promotes freedom from industry one works in
external control
Real time monitoring- multiple security system
National interest- the general and continuing
end for which a nation act. Conflict resolution- integrated security systems
come with a package of video surveillance
National strategy- strategic plan / it is the art and
science of developing and using the political Productivity- guarantee to boosting productivity
in the workspace
National power- numerical strengths
Business savings- save money and be protected
Political strength- stability of the government and
the soundness of its foreign policy Environmental design- the initial layer of security
for a campus
Economic strength- combination of factor such
as geographic location Mechanical and electronic access control-
key control and locks become a problem with large
Cultural strength - the social and moral fiber of user populations and any user turnover
the people and things they believe in
Intrusion detection- monitor for attacks
Military strength- ability of nation to exert
pressure by armed force and furtherance of Video monitoring- are more useful for incident
national policy verification and historical analysis
Protection- community from violent and or
dangerous crimes

Service - population by eliminating high profile


offenders and ensuring the safety of said
population

Customer service oriented- emphasis on


preservation of peace and security within their
community jurisdiction

Corporate security- resilience of corporations


against espionage

Detention- defect any threat for prevention

Deterrence- necessary procedures to deter


sabotage

You might also like