Across
- 2. – A weakness in security systems that can be exploited by threats or unauthorized individuals.
- 5. – A signaling device used to alert personnel to security breaches or emergencies.
- 8. – Continuous observation of activities to detect and prevent security breaches.
- 9. – Training and education programs that inform personnel about proper security practices.
- 10. – A defined step-by-step process for completing security-related tasks properly and safely.
- 12. – Any indication or potential cause that can harm or disrupt security and safety.
- 15. – The act of stealing small quantities of goods or materials over time, often by employees.
- 16. – Unauthorized entry into a protected area or system.
- 18. – Ensuring that sensitive information is only accessible to authorized individuals.
- 19. – A formal statement of principles and rules to guide security practices within an organization.
Down
- 1. – Protection of buildings, people, and assets.
- 3. – A systematic process of identifying, evaluating, and prioritizing potential hazards or threats.
- 4. – A designated safe route used during fire or other emergencies.
- 6. – Safeguarding an organization’s physical and intangible resources against theft or loss.
- 7. – A trained personnel responsible for protecting property, assets, and people from harm or theft.
- 11. – Process of preparing personnel to handle threats and emergencies.
- 13. – A detailed set of procedures to ensure safety and business continuity during emergencies.
- 14. – A centralized area where monitoring, communication, and response systems are managed.
- 17. – A system or method used to regulate who can enter or exit specific areas within a facility.
- 20. – Closed-Circuit Television system used for surveillance and monitoring of premises.
