My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Role of Security System

Across
global and environmental threats; these threats include natural disasters such as floods, earthquakes, tornadoes, hurricanes, and storms
_____ Threats purposeful and deliberate crimes by an unknown person or group that results in some form of damage; these crimes include espionage, identity theft, computer hacking and terrorism
involves the chance that something will happen and typically involves the use of mathematics
making sure that a supervisor or other employees go through a prescribed series of inspections that will determine whether the functions or procedures for which they are responsible are being properly executed
the overall role of security management that includes identifying potential areas of loss and developing/installing appropriate security countermeasures
Down
occur accidentally or by chance
an assessment used to identify potential problem areas
management techniques that identify, analyze, and assess risks/threats; if a risk/threat is detected, methods are employed to manage it
relies on a single deterring factor (i.e. guards)
standard security systems (equipment, personnel, or both) without a connection to any specific threats and with the assumption that packaged systems will take care of all problems
a term used to help separate vulnerabilities into smaller, specific categories; also means the impact of a loss as measured in dollars
– security systems that have individual pieces added to the loss prevention function as the need arises, without a comprehensive plan
a technique used to avoid or eliminate a risk, problem, threat, or hazard
planning for the worse by creating a plan for an eventual loss without insurance
Packaged _____ standard security systems (equipment, personnel, or both) without a connection to any specific threats and with the assumption that packaged systems will take care of all problems
Vulnerability _____: the method used to determine a threat or the vulnerability of a location