Across
- 2. - An event that disrupts normal operations and requires attention.
- 5. - Spying to obtain confidential information illicitly.
- 7. - Security assessment to identify vulnerabilities.
- 9. - The potential for loss or harm to assets.
- 11. - Term for lock pickers or safe crackers.
- 13. - Heavily fortified container for securing valuables.
- 14. - Measures taken to protect personnel, property, and information.
- 15. - Coercion used to force compliance or reveal alarm.
- 16. - Secure container for storing documents or valuables.
- 19. - Deliberate destruction or damage to disrupt operations.
- 20. - Someone who betrays trust within an organization.
Down
- 1. - A critical event requiring immediate response.
- 3. - Official permission for security personnel to operate
- 4. - Unauthorized person attempting access to restricted areas.
- 6. - Regular surveillance to deter or detect unauthorized activity.
- 8. - Scientific methods used to investigate crimes in industrial security.
- 10. - Person who carries out sabotage.
- 12. - Substances used to cause explosions, dangerous in security.
- 17. - Security system to block unauthorized network traffic.
- 18. - Person responsible for protection and monitoring.
