Security Concept and Threats

123456789101112131415
Across
  1. 2. One common characteristic of a suspicious person is that he/she constantly licks of his/her _____.
  2. 4. If you see a suspicious vehicle, you must write down its _________________ plate number
  3. 6. Two things security officers must protect: _______ and property.
  4. 7. Who should you contact if you are unsure of your duty?
  5. 10. A report used for recording crimes / accident
  6. 12. Security _______ is a scrutiny of a site’s procedures and systems
  7. 13. Most prevalent security threats at the moment
  8. 15. An item designed to explode on impact (bomb)
Down
  1. 1. A log/book for writing daily security activities
  2. 3. Espionage is the practice of __________
  3. 5. IED is also known as Improvised _________ Device.
  4. 8. Typically, there will be excessive _____________ on a suspicious parcel.
  5. 9. A video surveillance system used for legitimate safety and security purposes
  6. 11. A type of tape used in securing incidences.
  7. 14. A commonly used security communication equipment is a two-way ___________.