Across
- 3. – A weakness that can be exploited by threats.
- 4. – A prepared procedure to handle emergencies or disasters.
- 9. – Device that signals when unauthorized access occurs.
- 10. – Continuous observation of people or areas for security purposes.
- 12. – Protection of computer systems from digital attacks.
- 13. – The process of identifying and evaluating potential hazards.
- 14. – A set of rules and guidelines for security operations.
- 16. – The act of stealing small quantities or low-value items from the workplace.
- 17. – A person employed to protect property and personnel.
- 19. – The routine inspection of areas to ensure safety and security.
Down
- 1. – Unauthorized entry into a restricted area.
- 2. – A designated safe route used during an evacuation.
- 5. – A badge used for identification and access within a facility.
- 6. – A potential cause of unwanted incident or harm.
- 7. – The act of keeping people and assets safe from harm.
- 8. – Written documentation of a security event or breach.
- 11. – Security measure restricting movement due to threats.
- 13. – A system that uses video cameras to monitor and record activities.
- 15. – A system that restricts entry to authorized personnel only.
- 18. – The deliberate destruction or disruption of industrial operations.
