0% found this document useful (0 votes)
91 views124 pages

Industrial Security Concept

The document discusses various topics related to industrial security including concepts of security, personal security, personnel security, physical security levels, barriers, fences, lighting and more. It provides definitions and details about security concepts and considerations for protecting industrial facilities, personnel and assets.

Uploaded by

Ramirez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views124 pages

Industrial Security Concept

The document discusses various topics related to industrial security including concepts of security, personal security, personnel security, physical security levels, barriers, fences, lighting and more. It provides definitions and details about security concepts and considerations for protecting industrial facilities, personnel and assets.

Uploaded by

Ramirez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 124

INDUSTRIAL SECURITY

CONCEPTProf. Lorenzo Ramirez, RCrim, MSCJ(u), CSP


SECURITY
A state or quality of being secure; freedom
from fear and danger.
Security is a condition of resistance to any
type of behavior that causes harm or
damage to a person or to property.
It is the degree of protection against
danger, loss, and criminals
Q. Which of the following should be
excluded as major divisions of
security?
A.Personal Security
B. Physical Security
C.Personnel Security
D.Document and Information
Security
Personal Security Personnel Security
Involves the refers to the
protection of top- procedure followed,
ranking officials of the inquiries conducted,
government, visiting and criteria applied
persons of illustrious to determine the
standing and foreign work suitability of a
dignitaries. Also particular applicant
called VIP security. or the retention of a
particular employee.
Levels of Physical Security
• Minimum Security designed to impede unauthorized external
activity or intrusion
• Low level Security designed to impede and detect
• Medium Level Security is designed to impede, detect, and
asses external and internal activities
• High Level Security is designed to impede, detect, and asses
external and internal activities. This system composed of all
measures and devices incorporated in 3 levels above cited
• Maximum Security designed to impede, detect, asses and
neutralize all unauthorized external and internal activities
Industrial Security- A form of physical security involving
industrial plants and business enterprises. This involves the
safeguarding of personnel, processes, properties and
operation.
Hotel Security- Is the protection resulting from the
application of various measures which safeguards hotel
guests and their personal effects, hotel properties and
functions in hotel restaurant, bars and clubs.
Bank Security – Is the
protection resulting from
the application of various
measures which
safeguards cash and
assets which are in storage,
in transit, and or during
transaction.
VIP Security – It is applied
for the protection of top
ranking officials or private
entity.
Presidential Security Group
(PSG)
Arm of Department of National
Defense (DND) which is under the
Office of the President.
The role of the PSG is to provide
protective security to the following;
• The President and their immediate
families.
• Former Presidents and their
immediate families.
• Visiting heads of states or
diplomats and Cabinet Members
and their families travelling with
them.
Police Security and
Protection Group (PSPG)
• Secure and protect elected
and appointed national
government officials.
• Members of the diplomatic
corps and visiting foreign
dignitaries.
• Delegates and/or participants
during special events.
• Private individuals authorized to
be given protection and vital
government installations.
School Security- Security
involving not only facilities
but also the students,
faculty members and
school properties.
Supermarket Security-
Security involving the
facility, merchandise and
goods also to prevent
shoplifting to proliferate in
the establishment.
PHYSICAL SECURITY
Sum total of all physical protection
employed or installed to secure assets. It
includes the following;
Human Guards
Perimeter Fences
Security Devices and etc.

*Physical security is considered as broadest


type of security.
BARRIER
Any structure or physical device capable of
restriction, deterring or delaying illegal access to an
installation.
GENERAL TYPE OF BARRIER
Natural Barrier – Examples of
which are rivers, etc. which
delay or make more difficult
the entry of intruder.

Man-made Barrier – They are


structural construction like
fences, walls, roofs, etc.
KINDS OF BARRIER
• Natural Barrier – It includes bodies of water,
mountains, marshes, ravines or other terrain that
difficult to traverse.
• Structural Barrier – These are the features
constructed by man.
• Human Barrier – These are persons hired in
providing a guarding system.
• Animal Barrier
• Energy Barrier
DEPTH OF DEFENSE
Q. Its s an limits of an installation or area
to restrict or impeded access thereto.
Any physical barrier used to supplement
the protection of an inside or outside
perimeter.
A. Supplemented barrier
B. Additional barrier
C. Further barrier
D. Perimeter barrier
Inside Perimeter
It is a line adjacent to protected
area.

Outside Perimeter
It is a line of protection somewhat
removed from the protected area
FENCES
Solid Fence
This is a kind of fence that is
constructed in such a way
that visual access through
the fence is denied from
the intruders.

Full View Fence


This is a kind of fence that
provides visual access
through the fence.
SOLID FENCE
ADVANTAGES DISADVANTAGE
It denies visual access of It prevents the installation
the installation to the guards from observing
intruder. the area around the
It denies the intruder the installation.
opportunity to become
familiar with the A solid fence it create
personnel, activities and shadow which may be
time schedule of used by intruder for cover
movement of guards and concealment.
within an installation.
FULL VIEW FENCE
ADVANTAGES DISADVANTAGE
Roving patrol and It allows visual access to
stationary guards are able the installation, its
to keep the are personnel, its guards and
surrounding the installation its activities.
under observation.
It allows the intruder to
It does not create shadow
become familiar with the
which would provide
movement and the time
cover and concealment
schedule.
for the intruder.
TYPE OF WIRE FENCES
CHAIN LINK FENCE
• Must be constructed in 7 feet
material excluding the top
guard
• Must be of 9 gauge or heavier
• Mesh opening must not be
larger than 2 inches
• Reach within 2 inches of hard
ground or paving
• On soft ground, it must reach
below surface deep enough
to compensate for shifting soil
or sand.
TYPE OF WIRE FENCES
BARBED WIRE FENCE
• Standard barbed wire is twisted
double strand, 12 gauge wires,
with 4 point barb spaced on
equal distant part.
• Barbed wire fencing should not
be less than 7 feet high,
excluding the top guard.
• Barbed wire fencing must be
firmly affixed to post not more
than 6 feet apart.
TYPE OF WIRE FENCES
CONCERTINA WIRE FENCE
• Standard concertina
barbed is a commercial
manufactured wire coil of
high strength steel barbed
wire clipped together at
intervals to form cylinder.
• Opened concertina wire is
50 feet long and 3 feet in
diameter.
Q. House-like structure above the
perimeter barriers. It is used by the
security guards in observing
activities in the nearby surroundings.
A.Gates and doors
B. Security tower
C.Clear zone
D.Utilities opening
CLEAR ZONE
Refers to unobstructed area maintain on
both sides of the perimeter barrier.
• 20 feet or more between the perimeter
barrier and exterior structure. (Outside)
• 50 feet or more between the perimeter
barrier and structure within the
protected areas. (Inside)
Q. It is additional overhang of
barbed wire placed on vertical
perimeter fences.
A.Sign and notices
B. Top guard
C.Toppings
D.NOTA
TOP GUARD
• Upwards and
outward
• 45* angle
• Three to four
strands of barbed
wire
Q. It provides sufficient
illumination to the areas during
hours of darkness
A. Lighting
B. Protective lighting
C. Spotlight
D. Uplight
PURPOSES
• It improves visibility so that intruders can be
seen, identified or apprehend.
• It gives psychological fear, which serves as a
deterrent,
• It makes easier for guards to identify
employees and vehicles during night time.
• It may even reduce the number of stationary
guards.
TYPES OF PROTECTIVE LIGHTING
Stationary Luminary- This is a
common type consisting of series of
fixed luminous flood.
• Glare-Projection Type- The
intensity is focused on the intruder
while the observer guard
remained in the comparative
darkness.
• Controlled Lighting Type- The
lighting is focused on the pile of
items, rather than the back
ground. The wealth of the lighted
strip can be controlled and
adjusted to suit the security needs.
TYPES OF PROTECTIVE LIGHTING
Moveable Lighting- This consist of
stationary or portable, manually
operated searchlights. The
searchlights may be lighted
continuously during the hours of
darkness nor only as needed, it is
just a supplementary to other
protective or security Lighting.
Emergency Lighting- This standby
lighting may be utilized in the event
of electric failure, either due to
local equipment or commercial
failure.
Q. Lamps that best used in
foggy areas.
A. Incandescent lamp
B. Gaseous discharge lamp
C. Quartz lamp
D. Okes lamp
TYPES OF LIGHT LAMP
Incandescent Lamps- These are
common light bulbs that are
found in every home. They have
the advantage of providing
instant illumination when the
switch is thrown and most
commonly used protective
lighting system.
TYPES OF LIGHT LAMP
Gaseous-Discharge Lamp- The
use of this in protective lighting is
limited since they require a
period of two to five minutes to
light when they are cold and
even longer period to light,
when hot, after a power
interruption, it is very
economical to use but for
industrial security it is not
acceptable due to long time of
lighting.
TYPES OF LIGHT LAMP
• Mercury Vapor Lamps- These
lamps give a blue green color
light due to the presence of
mercury vapor. Its initial cost is
higher than incandescent lamps
of the same wattage but is more
efficient and give more light. This
is widely used in interior and
exterior lighting.
• Sodium Vapor Lamp- These
lamps emits Yellow Light. It is an
efficient bulb and due to its color,
these light lamps are used in
TYPES OF LIGHT LAMP
Quarts Lamp- These lamps
emits very bright white light
and instant on almost as
rapidly as the
incandescent lamp. They
are frequently used at very
high wattage and they are
excellent for use along the
perimeter barrier.
Q. Is an aural or visual signal given by
the annunciator to the security when
intruder actuate certain devices in a
protected area. Designed to alert
security personnel of a attempted or
consummated intrusion into an area,
building or compound.
A. ALARM
B. PROTECTIVE ALARM
BASIC PARTS OF ALARM SYSTEM
• Sensor or Trigger Device – It emits the
aural or visual signals or both.
• Transmission Line – A circuit which
transmits the message to the signaling
apparatus.
• Enunciator/Annunciator – It is the
signaling system that activates the
alarm.
PROTECTIVE ALARM
DEVICES, BANK
ALARMS AND
ALARM SYSTEMS
TYPES OF DEVICES
Metallic Foil or Wire
• It will detect any action that moves or break the foil or
wire.
• It is commonly used in window or glass surfaces of building
or compound, all possible point of entry can be wired by
using electrically charge strips of tinfoil or wire.
Photoelectric or Electric Eye Device
• A light beam is transmitted at a frequency of several
thousand vibrations per second.
• It is connected by a wire to control station and when an
intruder crosses the beam he breaks the contact with the
photoelectric coil which thus activates the alarm.
TYPES OF DEVICES
Audio Detection Device
• It is a supersensitive microphone speaker sensor that is
installed in walls, ceilings, and floors of the protected
area.
• Any sound caused by attempted forced entry is detected
by file censor.
Vibration detection device
• The vibration-sensitive sensor is attached to walls, ceilings
or floors of the protected areas.
• Any vibration caused by attempted force entry is
detected by the sensor.
TYPES OF DEVICES
Magnetic Door Contact
• It is a protective device usually placed in the
door, and window that can send notification
when the opening and closure occurs
Motion Sensor
• Able to distinguish if an infrared emitting object
is present by first learning the ambient
temperature of the monitored space and then
detecting a change in the temperature
caused by the presence of an object.
TYPES OF BANK ALARMS
Foot Rail Activator
• They are place on the floor in such a
position that tellers may activate the
alarm by placing the front of their foot
engage the activation bar.
Bill Traps
• Usually place in the tellers top cash
drawer
• When currency is removed from the
devices, the alarm is activated.
TYPES OF BANK ALARMS
Knee or Thigh Buttons
• It is installed inside the deck or teller station
so they can be activated by knee or thigh
pressure.
Foot Button
• Like the foot rails it permits alarm
activation in relatively safety while both
hands remain clear in view of the robbers.
TYPES OF ALARM SYSTEM
Central Station System
• Type of protective alarm where the
central station located outside the
installation.
• It can be located in agency and the
installation is one of the subscribers.
• When alarm is sounded, central station
notifies police and other agency.
TYPES OF ALARM SYSTEM
Proprietary System
• It is the same as the central station
system except that it is owned by,
operated and located in the facility
• It is located inside the industrial firm
itself with a duty operator.
TYPES OF ALARM SYSTEM
Local Alarm by chance System
• This is a local alarm in which a siren or
bell is sounded with no predicable
Response.
• These systems are used in residence or
small establishment which cannot
afford a respond system.
TYPES OF ALARM SYSTEM
Dial Alarm System
• This system is set to dial a
predetermined number when the
alarm is activated. The numbers
selected might be the police station
or others.
• When the phone is answered, a
recording state that an intrusion is in
progress at the location alarmed.
TYPES OF ALARM SYSTEM
Auxiliary System
• In this system installation circuits are
led into local police or fire
department by lease telephone line
FIRE PROTECTION
CLASSES OF FIRE
CLASS A FIRES – Fires involving ordinary
combustible materials.
CLASS B – Fires involving flammable and
combustible liquids and gases.
CLASS C – Fires involve energized electrical
equipment.
CLASS D – These metals can be
magnesium, potassium, powdered
aluminum and zinc.
PASS
PULL the pin - Fire extinguishers often have a pin,
latch, or puncture lever that you need to release
first.
AIM low - Aim the nozzle or hose of the
extinguisher at the base of the fire.
SQUEEZE the handle - This releases the
extinguishing agent.
SWEEP from side to side - Move in close, and
sweep across the base of the fire.
FIRE SAFETY DEVICES

Automatic Fire Suppression System – A


system of underground or overhead
pipping or both connected in extinguishing
agent, when activated by its automatic
detecting device, suppresses fires in
protected area.
FIRE SAFETY DEVICES
SMOKE DETECTOR
A device placed at the ceilings
of the floor that detects smoke,
typically as an indicator of fire.
AUTOMATIC SPRINKLER
A type of built in sprinklers which
works by the increase of room
temperature and which
automatically operates the
system to put out the fire.
FIRE SAFETY DEVICES
STAND PIPE
Steel or plastic pipes located
inside the building from the
lowest to the top floor with
water under pressure for use in
case of fire.
FIRE HYDRANT
Mechanical device
strategically located in an
installation or in a street where
a fire hose will be connected.
Q. A system consisting of a television
camera, video monitor, and a
transmission medium (cable, fiber or
wireless). It is used to monitor the
premises.
A. WOLVES
B. LASER
C. CCTV
D. PIR
Q. Defined as mechanical,
electrical, hydraulic or
electronic device designed
to prevent entry to a building
or room.
A.Lock
B.Protective lock
TYPE OF PROTECTIVE
LOCKS
PADLOCK
A portable and
detachable lock having
a pivoted or sliding
hasp which possess
through a staple ring, or
the like and is made fast
or secured
TYPE OF PROTECTIVE
LOCKS
Warded Locks
It offers very little
security, this type of lock
must therefore be use
only to have privacy,
but not to provide
degree of security.
TYPE OF PROTECTIVE
LOCKS
Disc Tumbler Locks
It is commonly designed for
automobile industry and is
in general use in car doors
today because this lock is
easy and cheap to
manufactured
TYPE OF PROTECTIVE
LOCKS
Pin tumbler Lock
The pin tumbler
mechanism depends for its
security, on a number of
round pin or tumblers
operating on a cylinder.
TYPE OF PROTECTIVE
LOCKS
Combination Locks
A lock that requires
manipulation of dials
according to a predetermined
combination code of numbers
or letters
Code-Operated Locks
They are open by pressing a
series of numbered buttons in
the proper sequence.
TYPE OF PROTECTIVE
LOCKS
Card-Operated Locks
Coded card notched,
embossed or containing an
embedded pattern of copper
flocks.
These are frequently fitted with
a recording device which
register time and identify the
user.
Q. It is the management of keys in a
plant or business organization to
prevent unauthorized individual
access to the keys.
A. Key assignment
B. Key control
C. Key lounge
D. Key lay
TYPES OF KEY
Change key
A key to single lock within a master keyed
system.
Sub-Master Key
A key that will open all the locks within a
particular area or grouping in a given
facility.
TYPES OF KEY
Master Key
A special key capable of opening a series of
locks.
This key is capable of opening less number of
locks than the grand master key.
Grand Master Key
A key that will open everything involving two or
more master key groups.
Q. A term used in England for lock
picker, safecrackers, and
penetrators of restricted areas or
room.
A. Peterman
B. Peterpan
C. Petermo
D. Peter Co
Q. April Girl who having a picklock
in her possession. Is there a crime
committed?
A. Violation of Art. 305 (False key)
B. Violation of Art. 304 (Possession
of picklocks or similar tools)
C. Robbery
D. None
STATUTORY PROHIBITIONS OF KEY
Art. 304 Possession of picklocks or similar tools
Element;
1. That the offender has in his possession or similar
tools
2. That such picklock or similar tools are specially
adopted to the commission of robbery
3. That the offender does not have lawful cause for
such possession.

*Actual use of picklock or similar tools is not necessary


STATUTORY PROHIBITIONS OF KEY
Art. 305 False key
False key include;
1. Picklock or similar tools
2. Genuine key stolen from the owner
3. Any key other than those intended by the
owner for use in the lock forcibly opened by
the offender.
*Possession of false keys in pars. 2 and 3 above are
not punishable. If the key was entrusted to the
offender and he used it to steal, crime is not robbery
but theft
PROTECTIVE CABINETS
TYPES OF PROTECTIVE
CABINETS
SAFE
Metallic container used for the
safekeeping of documents or
small items in an office or
installation.
• At least 750 lbs or below
750 lbs must be anchored
to building structure.
1. FIRE RESISTIVE
• 1 inch thick steel.
2. BURGLARY RESISTIVE
• Door should be 1 1/2 thick
steel.
TYPES OF PROTECTIVE
CABINETS
VAULT
Heavily-constructed fire and burglar
resistance container usually a part of
the building
• Doors should be 6 inches thick
made of steel (Concrete)
• Walls, ceilings and floor should
be 12 inches thick
• Floor should be elevated by 4
inches
• Not more than 5,000 cubic
feet in size *Located at or below ground level;
• Vault door must be fire-resistive *Should not be part of the wall
up to 4 to 6 hours
TYPES OF PROTECTIVE
CABINETS
FILE ROOM
A cubicle in a building constructed
a little lighter than a vault but
bigger size
I can accommodate limited people
to work on the records inside.
• Should be 12 feet high
• Interior cubage should not
be more than 10,000 cubic
feet
• Water-tight door, fire-proof
for 1 hour
CRIME PREVENTION
THEORIES
ROUTINE ACTIVITY
THEORY– develop by Marcus
Felson and Lawrence Cohen,
explained that crime in terms
of crime opportunities that
occur in everyday life. A crime
opportunity require that
elements converge in time and
place including:

ü Motivated offender
ü Suitable target or victim
ü Lack of capable guardian
DEFENSIBLE SPACE
THEORY – tends to have
focus on preventing
easy access and exit by
potential criminals as
well as the elimination
of their hiding places
and where they can
geographically select a
target.
Q. Which do you prefer,
a high and above eye
level walls or below eye
level walls at your lawn?

NOTE: Defensible Space theory


does not recommend an
above high-level fence or walls
because it denies visibility from
the outside which could be
lead to “No Help Factor”
BROKEN WINDOWS
THEORY– argues that
signs of decay, disorder
and incivilities, such as
abandoned buildings,
broken street lights, and
graffiti all invite
potential criminals to an
area.
BROKEN WINDOWS
THEORY– argues that
signs of decay, disorder
and incivilities, such as
abandoned buildings,
broken street lights, and
graffiti all invite
potential criminals to an
area.
Q. Private security agency law
of the Philippines (CLE DEC
2018)
A.RA 5478
B. RA 5874
C.RA 5784
D.RA 5847
SALIENT POINTS OF
RA 5487 &RA 11917
• Company Security- A security guard
recruited and employed by the
company.
• Private Security- A security guard
hired by client belonging to private
security agency.
• Government Security- A security
guard recruited and employed by
the government.
Private Security Professional (PSP)
Refers to a person who is issued a valid LESP
“License to Exercise Security Profession
(LESP) refers to a permit issued by the Chief of
the Philippine National Police (PNP) or the duly
authorized representative…”

Validity: Five(5) years


Private Security Agency (PSA)
Any Filipino citizen or juridical entity wholly
owned and controlled by Filipino citizens
may organize a private security agency
and provide security
services: Provided, That they shall not
employ more than two thousand (2,000)
private security professionals as defined in
this Act
PSA OPERATOR OR Licensee
• Must be at least twenty-five (25) years of age;
• Must hold a bachelor's degree;
• Must be a part owner of the company or in case of juridical
entity, holder of at least one (1) share of stock with voting rights;
• Must be of good moral character;
• Must not have been convicted of any crime or offense
involving moral turpitude; and
• Must be physically and mentally fit, and passed the neuro-
psychiatric test and drug test administered by the PNP or other
similar government centers and facilities:
License to Operate.
A license to operate issued by the Chief PNP is
required to operate and manage a PSA and PSTA
“Private Security Training Agency (PSTA) refers to any
person, natural or juridical, who engages in the
business of providing training and academic
programs and courses duly approved and prescribed
by the PNP and adopted by the Technical Education
and Skills Development Authority (TESDA)”
Validity: Three(3) years for new application; Five(5)
years for renewal application
The Civil Security Group
provides administrative
services and general
supervision over the
organization, business
operations, and activities of all
organized Security Agency In
the Philippines.
Q. Minimum educational requirement for
security guard.
A. Elementary Graduate
B. Highschool Graduate
C. Collage Graduate
D. Master’s Degree

NOTE: Age shall be not less than 18 but nor


more than 50 years of age.
TENURE OF SECURITY
PERSONNEL
Q. Jose R. Reyes, a retired Police Chief Superintendent
of the Philippine National Police (PNP) and his fellow
retired PNP officers are planning to establish a security
guard and private detective agency in Manila. In what
office of the government does their agency be
registered?
A. Department of Interior and Local Government (DILG)
B. Philippine Association of Detective and Protective
Agency Operators, Inc. (PADPAO)
C. Philippine National Police, Supervisory Office for
Security and Investigative Agencies (PNP-SOSIA)
D. Securities and Exchange Commission (SEC)
Issuance of Firearms
…That a PSA shall only be allowed
to possess small arms, not
exceeding one (1) firearm for each
PSP, to include single-post, in its
employ
Maximum Ammunition issued to Security
Personnel
A PSA is only allowed to issue a maximum of twenty-
five (25) rounds of ammunition per firearm. The
remaining 25 rounds shall be kept in storage.

Provided that, fifty (50) rounds may be issued by PSAs


to deployed mine security guards, power plant
security guards, armored vehicle crew, PSEs/PAs,
critical infrastructure, vital installation, and such other
cases as may be determined by Chief, SOSIA.
EXEMPTIONS FROM PRE-LICENSING TRAINING
• Holder of a Degree of Bachelor of Laws
• Holder of Degree of Bachelor of Science in
Criminology
• Graduate of Criminal Investigation Course
offered by NBI or any PNP training school.
• Veterans and retired military/police personnel or
honorably discharged military/police personnel
possessing all the qualifications mentioned in
the preceding section
PERSONNEL SECURITY
Personnel Security Investigation – is an inquiry into the
character, reputation, discretion, integrity, morals and
loyalty of an individual in order to determine a person’s
suitability for appointment access to classified matter.
National Agency Check
Local Agency Check
Background Investigation
• Complete Background Investigation - it is a type of BI
which is more comprehensive, particularly all the
circumstances of his personal life.
• Partial Background Investigation -investigation of the
background of the individual but limited only to some
of the circumstances of his personal life.
FACTORS TO CONSIDER IN THE CONDUCT OF
BACKGROUND INVESTIGATION
1. Loyalty
2. Integrity
3. Discretion
4. Moral
5. Character
6. Reputation
POSITIVE VETTING
The essence of vetting is a personal
interview conducted under stress.
PROFILING
Is the process whereby the subject’s
reaction in future critical situation is
predicted by observing his behavior.
DETECTION DECEPTION
TECHNIQUE
• Lie detector machine (Polygraph
Machine)
• Psychological stress evaluator
• Word Association Test (WAT)
Q. Is the susceptibility of the plant or
establishment to damage, loss or disruption
of operation due to various hazards.
A. Relative Criticality of Operation
B. Relative Vulnerability
C. Relative Operation
D. Vulnerable Operation
Relative Criticality of Operation – is the
importance of firm with reference to the national
economy and security
SECURITY HAZARD
Human Hazard
Is the act or condition affecting the safe
operation of the facility caused by human
Active Measure
action, accidental or intentional, this type
Passive Measures – Programs
Installation of physical
of hazard is the result of athat will cease
state person from
of mind,
barriers, security committing an act for fear of
attitude, weakness,
lighting, use of vaults, or character
being traits
caught, on
charge in court
the part
locks andofdeployment
one or more persons, like
or dismissed, e.g. security
sabotage, espionage,
of security guards education programs,
investigations, fire prevention
seminars, personnel security
checks etc.
Natural Hazard
Is the act or situation caused by natural
phenomenon, like floods, typhoons,
earthquakes, etc. but there are many
measures and techniques which may be
employed to reduce their effects in
establishment, plants or installation.
PILFERAGE
One of the most common annoying
hazard which security has to deal with.

TYPES OF PILFERER
• Casual Pilferer – one who steals due to his
inability to resist the unexpected
opportunity and has little fear of detection.
• Systematic Pilferer – steals with
preconceived plans and takes away any
or all types of items or supplies for
economic gains.
SCENARIO #1
Maria is an employee of Bureau of Customers.
One day, her job as mail checker made her to
commit a sin. A mail containing dollars was
checked by her, and because the guard is
busy chatting with a “hot” customer, Maria
failed to resist the evil temptation. She emptied
the mail the envelope nearby bin. As a result,
she was immediately terminated and assigned
to the position of “jail mayora”.
SCENARIO #2
Pedro is an employee of Coca Cobra Company.
Knowing the location of company depot, Pedro,
before going home, immediately made his
operational plan. He checked the backdoor and
didn’t see the duty guard, who believed at that time,
is out to get a cup of coffee. Pedro initiated his plan to
grab 3 case of soft drinks. Pedro’s initial plan is to
make the guard drowsy, but sadly, he failed. The
guard discovered monosodium glutamate of aji ni
moto seasoning in his coffee but still in the packed by
the pilferer due to nervousness.
Q. It is a critical, on-site examination
and analysis of an industrial plant,
business, and name of public or private
institution to ascertain current security
status deficiencies or excesses
A. Security Inspection
B. Security Examination
C. Security Survey
D. Security Questioning
PURPOSE OF SECURITY SURVEY
• To determine existing state of security;
• To locate weaknesses in defense;
• To determine degree of protection required and;
• To produce recommendations establishing a total
security program.
SECURITY INSPECTION
It is the process of conducting physical
examination to determine compliance with
establishment security policies and procedures
as a result of security survey.
DOCUMENT AND
INFORMATION
SECURITY
TYPES OF DOCUMENTS
Class I – Vital Documents- In this category these are records
that are irreplaceable; records of which reproduction does
not have the same value as the original.
Class II – Important Documents- This includes records, the
reproduction of which will close considerable expense and
labor, or considerable delay.
Class III – Useful Document- This include records whose loss
might cause inconvenience, but could b readily replaced
and which would not in the meantime present an
insurmountable obstacle
Class IV – Non-essential Documents- These records are daily
files, routine in nature even if lost or destroyed, will not affect
operation or administration. This class represents the bulk of
the records which should not be attempted to protect.
CATEGORIES OF CLASSIFIED MATTER
Classify (PNPR
– is the200-0121)
assigning of an
1. Top Secret (GREEN) – Top Secretinformation
documents or material
calls to onedegree
for the utmost of the
of protection. Unauthorized revelation of this materials
four security and information
classifications after
would cause extremely severe damage to the nation, politically,
economically, or militarily.
determining that such information or
material requires security protection
2. Secret (RED) - Unauthorized disclosure of this documents or things may
put at risk the nation security, cause serious injury to the reputation of the
nation, the reproduction of whichDeclassify –The act cost
will be considerable of changing
and labor,the
or
significant delay assigned classification of a document or
3. Confidential (BLUE) - Unauthorizedmaterial, andofas
revelation part may
which of thebeprocess,
injurious it
involves notification
to the reputation of the nation or governmental activity of
or cognizant
would cause
authority.
administrative humiliation or unnecessary injury.
4. Restricted (BLACK) - This are information which should not be published
or communicated to anyone except Upgrading – ispurposes,
for official the changing of the
These records
classification
are daily files, routine in nature even of classified
if lost or destroyed, matter
will not affectto a
operation or administration. category higher than that previously
assigned to it.
CATEGORIES OF CLASSIFIEDCompartmentation
MATTER (PNPR 200-0121)
is the granting of
access
1. Top Secret (GREEN) – Top Secret to classified
documents calls fordocument
the utmostor
degree
information
of protection. Unauthorized revelation of this only to properly
materials cleared
and information
would cause extremely severe damage
persons.to the nation, politically,
economically, or militarily.
Security of
2. Secret (RED) - Unauthorized disclosure Clearance – Theor
this documents certification
things may by
a responsible
put at risk the nation security, cause authority
serious injury that the person
to the reputation of the
nation, the reproduction of which will be considerable
described costaccess
is cleared for and labor,
to or
significant delay
classified matter at the appropriate level.
3. Confidential (BLUE) - Unauthorized revelation of which may be injurious
to the reputation of the nation or Need-to-know
governmental is the term
activity givencause
or would to those
administrative humiliation or unnecessary
persons whoseinjury. official duty requires
knowledge
4. Restricted (BLACK) - This are information or possession
which should notthereof
be published
or communicated to anyone except for official purposes, These records
Acces
are daily files, routine in nature even Listoris destroyed,
if lost an authenticated list of
will not affect
operation or administration. personnel allowing entry to the plant,
facility or room with classified work.
KINDS OF SENSITIVE INFORMATION
Propriety Information – Information which relates
to the structure, products and business method of
the organization.
Trade Secret – Consist of formula, pattern, device
or compilation of information which is used in one
business and which give an opportunity to gain
an advantage over competitors who do not know
or use it.
Patent – It is grant made by the government to an
inventor, conveying and securing to him the
exclusive rights to make, use and sell his invention
for a term of 20 years.
Competitive Intelligence
Systematic program for gathering and analyzing
information about your competitor’s activities and
general business trends to further your own
company’s goal.
• White – available from company’s publication,
public records of commercial reporting sources.
• Gray – not ready available but which usually can be
obtained without acquiring any civil/criminal liability.
• Black – obtained thru clearly unethical or illegal
means and if discovered can result in civil/criminal
sanctions.
THREATS IN PROTECTION OF
SENSITIVE INFORMATION
• Eavesdropping – Unauthorized
listening
• Bugging – Interception of
communication using an electric
device
• Wiretapping – Interception of
communication circuit
Q. Can a police officer or law
enforcement official listen or record
any communication of a terrorist
organization of group of person?
A. YES
• Written order coming from Court of
First Instance
• 60 days
Q. License to Operate shall be
renew within how many days before
the expiration of such license? (CLE
2007)
A.2 months
B. 60 days
C.30 days
D.1 month
Q. Cathy owned an establishment located in
Caloocan City. One of her proposals is to
place fences on the entire area of her
property especially in securing and avoiding
any unauthorized person to view the activity
inside of her establishment. What type of
fence did Cathy plan to have? (CLE 2012)
A. Full view fence
B. Wire fence
C. Solid fence
D. None
Q. Tenure of security guard to render
his/her security service (CLE 2016)
A. It depends upon the validity of his/her
license
B. Upon expiration of LTO
C. Co-terminus with their contract in
security agency
D. 3 years
Q. Background checks of individuals
commensurate with the security
requirements of their work (CLE
2017)
A.Personal Security
B.Personnel Security
C.Security Investigation
D.Background Investigation
Q. Security guards of Camalig Hope Incorporated
was directed to issue a badge for every employee
and visitors entering within their facility and those
who entered are required to surrender issued
badges before leaving. This procedure uses pass
system, specifically an?
A. Single Pass System
B. Pass Exchange System
C.Multiple Pass System
D. Pass System
Q. To protect the asset, there are three general
steps in the implementation of system approach
in risk assessment, it is wherein action taken or a
physical entity to reduce or eliminate one or
more vulnerabilities
A. Vulnerability analysis
B. Installation of countermeasures
C.Test the risk
D. Countermeasure analysis
THANKYOU!
“And God said, Behold, I have given you
every herb bearing seed, which is upon
the face of all the earth, and every tree,
in the which is the fruit of a tree yielding
seed; to you it shall be for meat.” –
Genesis 1:29

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy