Tabletop Exercise: A test method that presents a limited simulation of a crisis scenario in a narrative format in which participants review and discuss, not perform, the policy, methods, procedures, coordination, and resource assignments associated with plan activation.
Tall Building Security: is a multi-story structure in which most occupants depend on elevators to reach their destinations. The most prominent tall buildings are called “high-rise buildings” in most countries and “tower blocks” in Britain and some European countries. Buildings provide a large amount of living or working space on a small land footprint. This means that valuable, often city, land can be used more efficiently. Security and safety issues were recurring themes in surveys of high-rise residents in Singapore, Hong Kong, and Australia, and all residents named fire among their top concerns.
Target hardening: using physical barriers or changes in a location to reduce the opportunity for crime and make completion of a crime more difficult.
Technical security: measures taken to identify, prevent or neutralize technical threats including electronic or electro-optic eavesdropping, wiretapping, bugging, signal intercept, covert/illicit surveillance, and attacks on Information Technology (IT) or telecommunications systems.
Technical Surveillance Countermeasures (TSCM): employment of services, equipment, and techniques designed to locate, identify, and neutralize the effectiveness of technical surveillance activities.
Threat assessment The process of identifying potential threats, conducting a probability analysis of the realization of those threats, and forecasting the impacts of those threats
Theory X and Theory Y: opposing sets of assumptions which postulate that under the conditions of contemporary industrial life the potentialities of the average employee are only partially utilized. Theory X assumes that the average employee inherently dislikes work, must be coerced to work toward the achievement of organizational objectives, has little ambition, and wants security above all. In Theory Y, the average employee regards work as natural as play or rest, is self-directed, is committed to organizational objectives to the extent they satisfy personal needs, accepts and seeks responsibility, and is imaginative and creative in solving work problems.
Threat: a potential cause of an unwanted incident, which may result in harm to individuals, assets, a system or organization, the environment, or the community. An action or event that could result in a loss; an indication that such an action or event might take place. An indication of something impending that could result in damage or injury. Threats may be deliberate or inadvertent. 2. Any verbal or physical behavior or communication that reasonably could be interpreted as communicating or conveying intent to cause physical harm to a person or property.
Threat analysis: in antiterrorism, threat analysis is a continual process of compiling and examining all available information concerning potential terrorist activities by terrorist groups that could target a facility. A threat analysis will review the factors of a terrorist group’s existence, capability, intentions, history, and targeting, as well as the security environment within which friendly forces operate. Threat analysis is an essential step in identifying probability of terrorist attack and results in a threat assessment.
Time value of money: a concept that takes into account the investment potential that is lost when funds are assigned to a major purchase made over a period of time. The period of time over which money is spent is usually equal to the useful life of the equipment or facility under consideration for purchase.
Trade secret: is information (including a formula, pattern, compilation, program, device, method, technique, or process) that derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use, and is a subject of efforts, that are reasonable under the circumstances, to maintain its secrecy.
Or, more simply, a trade secret is anything which:
• confers a competitive advantage on its owner;
• is subject to reasonable measures to prevent its disclosure;
• is not generally known in the industry or business in which it is used or practiced.
Generally speaking, to legally qualify as a trade secret, the information supporting a new product, process, or plan must be:
• Documented or readily identifiable;
• disclosed on a need-to-know basis;
• known to be a secret.
Trademarks: words, names, symbols, devices, or other graphic symbols, combinations thereof used by manufacturers or merchants to differentiate their goods and distinguish them from products that are manufactured or sold by others. Counterfeiting and infringement constitute violations of trademark rights.
Transnational crime: illegal activity involving more than one sovereign nation, or in which national borders are crossed, as in international terrorism, drug smuggling, and arms trafficking.