Alberta Security Training Part 1 Terms Solved 100%
Arrest - Answer To seize and take somebody into legal custody Assets - Answer Someone, something, or somewhere that contributes to the success of a business. People are often the most important _______ to a company. Contract - Answer Hired from outside of the hiring body Detention - Answer The act of keeping somebody in custody, or the state of being kept in custody Disturbances - Answer Any acts that cause disruption to others or hinders them from pursuing normal legal activities. Drafting - Answer writing a first version to be filled out and polished later Evidence - Answer Materials or information linked to a crime In-House - Answer Privately Hired security personnel responsible only for the facility their employer owns Jurisdiction - Answer The area over which legal authority extends Laying - Answer Giving information relevant to a charge Legislation - Answer A law or laws passed by an official body, especially a governmental assembly Man made threats - Answer Anything that is liable to cause harm or damage by a person or group Monitoring - Answer To watch over somebody or something, especially in order to ensure that good order or proper conduct is maintained Natural threats - Answer Things or events that have the potential to cause damage i.e. storms, floods, etc. Preliminary Investigation - Answer Coming before or leading up to the full investigation PIPEDA - Answer Personal Information Protection and Electronic Documents Act (2004). Search - Answer To examine the property of anyone for concealed items Seizure - Answer The lawful removal of property from a suspect for evidence Site - Answer A place you are assigned to work Testimony - Answer Evidence that a witness gives to a court of law Union - Answer An organization that ties together employees on the site for purposes of wages etc. Warrant - Answer Court order that grants authority for actions such as search and seizure of evidence and/or the arrest of an individual Computer System - Answer Means a device or a group of interconnected or related devices that : 1. Contains computer programs or other data, and 2. Interacts with computer programs , and 3. Performs logic and control, and may perform any other function. Electro-Magnetic, Acoustic, Mechanical or Other Device - Answer any device or apparatus that is used or is capable of being used to intercept any function of a computer system, but does not include a hearing aid used to correct subnormal hearing of the user to not better than normal hearing. Intercept - Answer Includes listening to a function of a computer system, recording a function of a system, acquiring the substance or meaning of a system, or purporting/false acting of a system. Traffic - Answer Means, in respect of a computer password, to _______, sell, export from or import into Canada, distribute or deal with in any other way. Piracy of Software - Answer Software is protected by copyright. Unauthorized use is a violation of this law. Unauthorized copying of software may result in liability for the individual using the software or his or her employer. Industrial Espionage - Answer Like piracy of software, _______________ simply represents a specialized type of theft. Industrial secrets - like the recipes for Kentucky Fried Chicken® and Dad's Cookies® - are often valuable, and carefully protected by the companies that own them. Top Secret - Answer Unauthorized disclosure would cause exceptionally grave damage to the nation . Secret - Answer Unauthorized disclosure would endanger National Security, cause serious injuries to the interest or prestige of the Nation or any Government Activity thereof, or would be of great advantage to a Foreign Nation . Confidential - Answer Unauthorized disclosure would be prejudicial to the interest or prestige of the Nation or any Government activity, or be of an advantage to a Foreign Power, individual personnel files may be accorded the protection of this classification . Restricted - Answer Should not be published or communicated to anyone except for official purposes. In industry, similar classifications are used to identify information and material that must be kept from competitors and the public . Virus - Answer A program that can infect other programs by modifying them to include a copy of itself (possibly evolving as it progresses) . Worm - Answer A program that spreads copies of itself through the network and attached computers. Trojan Horse - Answer A program that has hidden instructions designed to do things that the user of the program did not intend it to do . Access control - Answer any mechanism whose goal is to get the right person into the right area at the right time. Rank and File - Answer The people in an organization who actually do the work or provide the service
Escuela, estudio y materia
- Institución
- Alberta Security
- Grado
- Alberta Security
Información del documento
- Subido en
- 7 de marzo de 2024
- Número de páginas
- 11
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
alberta security stuvia
-
alberta security training part 1 terms solved 100
-
arrest to seize and take somebody into legal custo
-
assets someone something or somewhere that contr