Industrial Security Concept
Industrial Security Concept
Outside Perimeter
It is a line of protection somewhat
removed from the protected area
FENCES
Solid Fence
This is a kind of fence that is
constructed in such a way
that visual access through
the fence is denied from
the intruders.
ü Motivated offender
ü Suitable target or victim
ü Lack of capable guardian
DEFENSIBLE SPACE
THEORY – tends to have
focus on preventing
easy access and exit by
potential criminals as
well as the elimination
of their hiding places
and where they can
geographically select a
target.
Q. Which do you prefer,
a high and above eye
level walls or below eye
level walls at your lawn?
TYPES OF PILFERER
• Casual Pilferer – one who steals due to his
inability to resist the unexpected
opportunity and has little fear of detection.
• Systematic Pilferer – steals with
preconceived plans and takes away any
or all types of items or supplies for
economic gains.
SCENARIO #1
Maria is an employee of Bureau of Customers.
One day, her job as mail checker made her to
commit a sin. A mail containing dollars was
checked by her, and because the guard is
busy chatting with a “hot” customer, Maria
failed to resist the evil temptation. She emptied
the mail the envelope nearby bin. As a result,
she was immediately terminated and assigned
to the position of “jail mayora”.
SCENARIO #2
Pedro is an employee of Coca Cobra Company.
Knowing the location of company depot, Pedro,
before going home, immediately made his
operational plan. He checked the backdoor and
didn’t see the duty guard, who believed at that time,
is out to get a cup of coffee. Pedro initiated his plan to
grab 3 case of soft drinks. Pedro’s initial plan is to
make the guard drowsy, but sadly, he failed. The
guard discovered monosodium glutamate of aji ni
moto seasoning in his coffee but still in the packed by
the pilferer due to nervousness.
Q. It is a critical, on-site examination
and analysis of an industrial plant,
business, and name of public or private
institution to ascertain current security
status deficiencies or excesses
A. Security Inspection
B. Security Examination
C. Security Survey
D. Security Questioning
PURPOSE OF SECURITY SURVEY
• To determine existing state of security;
• To locate weaknesses in defense;
• To determine degree of protection required and;
• To produce recommendations establishing a total
security program.
SECURITY INSPECTION
It is the process of conducting physical
examination to determine compliance with
establishment security policies and procedures
as a result of security survey.
DOCUMENT AND
INFORMATION
SECURITY
TYPES OF DOCUMENTS
Class I – Vital Documents- In this category these are records
that are irreplaceable; records of which reproduction does
not have the same value as the original.
Class II – Important Documents- This includes records, the
reproduction of which will close considerable expense and
labor, or considerable delay.
Class III – Useful Document- This include records whose loss
might cause inconvenience, but could b readily replaced
and which would not in the meantime present an
insurmountable obstacle
Class IV – Non-essential Documents- These records are daily
files, routine in nature even if lost or destroyed, will not affect
operation or administration. This class represents the bulk of
the records which should not be attempted to protect.
CATEGORIES OF CLASSIFIED MATTER
Classify (PNPR
– is the200-0121)
assigning of an
1. Top Secret (GREEN) – Top Secretinformation
documents or material
calls to onedegree
for the utmost of the
of protection. Unauthorized revelation of this materials
four security and information
classifications after
would cause extremely severe damage to the nation, politically,
economically, or militarily.
determining that such information or
material requires security protection
2. Secret (RED) - Unauthorized disclosure of this documents or things may
put at risk the nation security, cause serious injury to the reputation of the
nation, the reproduction of whichDeclassify –The act cost
will be considerable of changing
and labor,the
or
significant delay assigned classification of a document or
3. Confidential (BLUE) - Unauthorizedmaterial, andofas
revelation part may
which of thebeprocess,
injurious it
involves notification
to the reputation of the nation or governmental activity of
or cognizant
would cause
authority.
administrative humiliation or unnecessary injury.
4. Restricted (BLACK) - This are information which should not be published
or communicated to anyone except Upgrading – ispurposes,
for official the changing of the
These records
classification
are daily files, routine in nature even of classified
if lost or destroyed, matter
will not affectto a
operation or administration. category higher than that previously
assigned to it.
CATEGORIES OF CLASSIFIEDCompartmentation
MATTER (PNPR 200-0121)
is the granting of
access
1. Top Secret (GREEN) – Top Secret to classified
documents calls fordocument
the utmostor
degree
information
of protection. Unauthorized revelation of this only to properly
materials cleared
and information
would cause extremely severe damage
persons.to the nation, politically,
economically, or militarily.
Security of
2. Secret (RED) - Unauthorized disclosure Clearance – Theor
this documents certification
things may by
a responsible
put at risk the nation security, cause authority
serious injury that the person
to the reputation of the
nation, the reproduction of which will be considerable
described costaccess
is cleared for and labor,
to or
significant delay
classified matter at the appropriate level.
3. Confidential (BLUE) - Unauthorized revelation of which may be injurious
to the reputation of the nation or Need-to-know
governmental is the term
activity givencause
or would to those
administrative humiliation or unnecessary
persons whoseinjury. official duty requires
knowledge
4. Restricted (BLACK) - This are information or possession
which should notthereof
be published
or communicated to anyone except for official purposes, These records
Acces
are daily files, routine in nature even Listoris destroyed,
if lost an authenticated list of
will not affect
operation or administration. personnel allowing entry to the plant,
facility or room with classified work.
KINDS OF SENSITIVE INFORMATION
Propriety Information – Information which relates
to the structure, products and business method of
the organization.
Trade Secret – Consist of formula, pattern, device
or compilation of information which is used in one
business and which give an opportunity to gain
an advantage over competitors who do not know
or use it.
Patent – It is grant made by the government to an
inventor, conveying and securing to him the
exclusive rights to make, use and sell his invention
for a term of 20 years.
Competitive Intelligence
Systematic program for gathering and analyzing
information about your competitor’s activities and
general business trends to further your own
company’s goal.
• White – available from company’s publication,
public records of commercial reporting sources.
• Gray – not ready available but which usually can be
obtained without acquiring any civil/criminal liability.
• Black – obtained thru clearly unethical or illegal
means and if discovered can result in civil/criminal
sanctions.
THREATS IN PROTECTION OF
SENSITIVE INFORMATION
• Eavesdropping – Unauthorized
listening
• Bugging – Interception of
communication using an electric
device
• Wiretapping – Interception of
communication circuit
Q. Can a police officer or law
enforcement official listen or record
any communication of a terrorist
organization of group of person?
A. YES
• Written order coming from Court of
First Instance
• 60 days
Q. License to Operate shall be
renew within how many days before
the expiration of such license? (CLE
2007)
A.2 months
B. 60 days
C.30 days
D.1 month
Q. Cathy owned an establishment located in
Caloocan City. One of her proposals is to
place fences on the entire area of her
property especially in securing and avoiding
any unauthorized person to view the activity
inside of her establishment. What type of
fence did Cathy plan to have? (CLE 2012)
A. Full view fence
B. Wire fence
C. Solid fence
D. None
Q. Tenure of security guard to render
his/her security service (CLE 2016)
A. It depends upon the validity of his/her
license
B. Upon expiration of LTO
C. Co-terminus with their contract in
security agency
D. 3 years
Q. Background checks of individuals
commensurate with the security
requirements of their work (CLE
2017)
A.Personal Security
B.Personnel Security
C.Security Investigation
D.Background Investigation
Q. Security guards of Camalig Hope Incorporated
was directed to issue a badge for every employee
and visitors entering within their facility and those
who entered are required to surrender issued
badges before leaving. This procedure uses pass
system, specifically an?
A. Single Pass System
B. Pass Exchange System
C.Multiple Pass System
D. Pass System
Q. To protect the asset, there are three general
steps in the implementation of system approach
in risk assessment, it is wherein action taken or a
physical entity to reduce or eliminate one or
more vulnerabilities
A. Vulnerability analysis
B. Installation of countermeasures
C.Test the risk
D. Countermeasure analysis
THANKYOU!
“And God said, Behold, I have given you
every herb bearing seed, which is upon
the face of all the earth, and every tree,
in the which is the fruit of a tree yielding
seed; to you it shall be for meat.” –
Genesis 1:29