0% found this document useful (0 votes)
70 views8 pages

Module 5 Lea 3

Uploaded by

rollydumocol1991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views8 pages

Module 5 Lea 3

Uploaded by

rollydumocol1991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

COLAND SYSTEM TECHNOLOGY, INC

Cotabato City
Second Semester, SY 2021-2022
Criminology Department

SUBJECT: INTRODUCTION TO INDUSTRIAL SECURITY


MANAGEMENT

MODULE 3 INTEGRATED SECURITY SYSTEMS


(Week 2)
MIDTERM

What I Need to Know


This module was designed and written with you in mind. It is here to help you
master Industrial Security Management this course for security practitioners. It represents
the basic concepts of security in relation to management. The scope of this module
permits it to be used in many different learning situations. The language used recognizes
the diverse vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.

Objectives:
After going through this module, you are expected to:
1. Explain the concept of the Integrated Security System
2. Reason out why the integration of security system is important
3. Describe the role of physical security in the system

N O T E: Read carefully and study the module before you answer the
assessment.

Preliminary Note
Integration means that security managers can create a tailored-fir security system within
their respective facilities, incorporating products to control access and security across one or
many sites at local, national, and even global levels. Integration makes monitoring, updating,
and reporting much easier and the business insight the systems provide means you can use
time and resources more efficiently and improve health and safety for personnel and visitors.

INTEGRATED SECURITY SYSTEM defined


Integrated Security System is the synergy of systems in an installation linked to other
products and systems, such as CCTV, authomatic number plate recognition and key lockers
and personnel programs. The security system acts as a hub that allows the integration and
operation of all systems from one place such as seamlessly control access via doors,
turnstiles, lifts, cark park barriers as well as monitoring real-time events via CCTV, controling

1
access to assets and areas via HR and activities directory systems and tracking assets and
personnel as needed.
PURPOSE AND IMPORTANCE OF INTEGRATING SECURITY SYSTEMS
In managing security, one solution does not fit all. Every organization or site has
different needs and priorities. Business owners and executives strive to take the necessary
steps forward to lead their business in the most optimal direction. While, profits, overhead,
personnel, and market improvement take much of their focus, we tend to forget one of the
most essential aspects of our business: security.
An integrated security system provides flexibility to incorporate what is needed only for
ease and comfortable use. Optimal security solutions that fit each business’s unique
requirements.
Integrated system means you can manage all aspects of security and access from one
place through one program. This is usually something you can control remotely often via app
on your smarhphone to give you extra ease of use. It is also easy to run reports, make
changes, view previous changes and by whom.
Here are some purpose of integrating security systems:
1. Efficieny – managing a business comes with an abundant amount tasks, one of them
being the company’s security. An integrated security system in any industry will allow
business to flourish more effectively and efficiently.
2. Centralization - integrated security system allows business security operations to
become more centralized. Management teams and business owners can now get a full
report from one area rather than needing to speak to all areas of the integrated security
system. This not only is a time saver, but also allows a more organized work flow for
businesses.
3. Loss Prevention - no matter what kind of industry one works in, they always have to be
prepared for the unexpected theft. Whether internal theft or external theft, it can be
overwhelming.
4. Real Time Monitoring - with multiple security systems, business management teams
are able to see what is going on within their facilities and areas of work instantly, if
needed. This also allows business owners to monitor their employee activities as it is
one of the most essential points in protecting their businesses from unwanted actions at
the workplace.
5. Conflict Resolution - integrated security systems come with a package of video
surveillance, access control, intrusion alarms, and uniformed guard services. All of
these elements will come forth if a problem were to arise in a workplace, whether it be
an internal/external burglary, attempted break-ins or just about any security threat that
can occur at a business.
6. Productivity - an integrated security System is a guarantee to boosting productivity in
the workspace. Study revealed that employee monitoring is being used to increase
customer satisfaction, improve employee performance and enhance productivity.
7. Business Savings - in the long run, having integrated security system will allow
business to save money and be protected Otherwise, in the case of a theft, burglary or
robbery, the business owners/management team would be heald liable for all the losses
with nowhere to turn to. With an integrated security system, business have multiple
outlets to look into and see what occurred, why it occurred or the possibility of those
events not even taking place at all.

PHYSICAL SECURITY SYSTEM


Physical security measures are being used to define, protect, and monitor property
rights and assets. These measures consist of barriers and devices that would detect, impede,
and prevent unauthorized access to equipment, facilities, material, and documents and to
safeguard them against espionage, sabotage, damage and theft.

2
Conceptually, the field of physical security has three important elements: the obstacles
to frustrate trivial attackers and delay serious ones; alarms, lighting CCTV and guard patrols to
make it likely that attacks will be noticed; and security response, to repel, catch or frustrate
attackers when an attack is detected.
Layers of Physical Security
In a well-designed physical security system, the three elements of physical security
must complement each other within the four layers of physical security, which are:
1. Environmental Design - the initial layer of security for a campus, building, office, or
physical space uses environmental design to deter threats. Some of the most common
examples are also the most basic - barbed wire, warning signs and fencing, concrete
bollards, metal barriers, vehicle height-restrictors, site lighting and trenches.
2. Mechanical and Electronic Access Control- includes gates, doors, and locks. Key
control of the locks becomes a problem with a large user population and any user
turnover. Keys quickly become unmanageable forcing the adoption of electronic access
control. Electronics access control easily manages large user populations, controlling
for user lifecycles times, dates, and individual access points.
3. Intrusion detection - monitors for attacks. It is less a preventative measure and more
of a response measure. Although some would argue that it is a deterrent. Intrusion
detection has a high incidence of false alarms.
4. Video monitoring - are more useful for incident verification and historical analysis. For
instance, if alarms are being generated and there is a camera in place, the camera
could be viewed to verify the alarms. In instances when an attack has already occurred
and a camera is in place at the point of attack, the recorded video can be reviewed
Physical Security also deals with things such as personnel, the environment, the facility and
its power supplies, fire protection, physical access, and even the protection of software,
hardware, and data files. The degree of physical security at any installation or command
depends on its physical characteristics, its vulnerability within the environment, and the type of
asset to be protected.
Minimum physical security requirements include four basic areas that an installation
must address:
1. physical security protection
2. physical access controls
3. data file protection
4. natural disaster protection

PHYSICAL BARRIERS
A barrier is any structure or physical device capable of restricting, deterring, delaying,
illegal access to an installation.
Generally, a barrier is use for the following purposes:
1. Define the physical limits of an area.
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of
intruders.
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control and vehicular traffic.

Types of Physical Barriers


1. Natural barriers - it includes bodies of waters, untains, marshes, ravines, deserts or
other terrain that are difficult to traverse.

3
2. Structural barriers - these are features constructed by man regardless of their original
intent that tends to delay the intruder. Examples are walls, doors, windows, locks,
fences, safe, cabinets or containers etc.
3. Human barriers - persons being used in providing a guarding system or by the nature
of their employment and location, fulfill security functions. Examples are guards, office
personnel, shop workers, etc.
4. Animal barriers - animals are used in partially providing a guarding system. Dogs are
usually trained and utilized to serve as guard dogs. German shepherds are best suited
for security functions. Goose and turkeys could also be included. 5. Energy barriers - it
is the employment of mechanical, electrical, electronic energy that imposes a deterrent
to entry by the potential intruder or to provide warning to guard personnel. These are
protective lighting, alarm systems and any electronic devices used as barriers.

PERIMETER SECURITY
The main purpose of perimeter barrier is to aeny or impede access or exit of
unauthorized persons. Basically, it is the first line of defense of an installation. This is maybe in
the form of fences, building walls or even bodies of water. The function and location of the
facility itself usually determine the perimeter of the installation. If the facility is located in a city
whereby the building or enterprise occupies all the area where it is located, the perimeter may
be the walls of the building itself.
Lines of Physical Defense
1. First Line- includes perimeter fence or barrier
2. Second Line – include doors, floors, windows, walls, roofs and grills and other entries
to the buildings.
3. Third Line- include storage systems like steel cabinets, safes, vaults and interior files.

PRINCIPLE OF PHYSICAL SECURITY


1. The type of access necessary will depend upon a number of variable factors and therefore
may be achieved in a number of ways.
2. There is no impenetrable barrier.
3. Defense in depth is barriers after barriers.
4. Delay is provided against surreptitious and non-surreptitious entry.
5. Each installment is different.

What is a Restricted Area?


- It is any area in which personnel or vehicles are controlled for reasons of security.

TYPES OF RESTRICTED AREA


1. Exclusion Area - is restricted area which contains a security interest to TOP SECRET
importance and which requires the highest degree of protection.
2. Limited Area Control – is a restricted area in which a lesser degree of contol is required
than in an exclusion area but which the security interest would be compromised by
uncontrolled movement.
a.) Interior Area Control – is generally affected in two ways. The first method is the system
which is initiated and terminated at the outer limits of the area to determine the movements of
a visitor within the area. A second method somewhat less means of accomplishing the same

4
thing is time travel. This system provides for checking the actual time used by the vistor
against unknown time requirements.
b.) Visitor Identification and Movements Control – processing and control of visitor shall be
included in the PASS SYSTEM.
c.) Key Control – a system of controlling keys shall be advised and regulations covering the
disposal, storage or withdrawals, shall be issued and imposed.
d. Fire Prevention

WHAT IS PERIMETER SECURITY?


- It is the protection of the installation’s inner and immediate vicinity. The main purpose of
perimeter barrier is to deny or impede access or exit of unauthorized person. Basically it
is the first line of defense of an installation. This may be in the form of fences, building
walls, or even bodies of water.

PERIMETER FENCES
A fence is a freestanding structure designed to restrict or prevent movement across a
boundary. It is generally distinguished from a wall by the lightness of its construction: a wall is
usually restricted to such barriers made from solid brick or concrete, blocking vision as well as
passage

Types of Fences
1. Solid fence-constructed in such a way that visual access through the fence is denied.
Its advantage is that it denies the opportunity for the intruder to become familiar with the
personnel, activities and the time scheduled of the movements the guards in the
installation. On the other hand, it prevents the guards from observing the area around
the installation and it creates shadow that may be used by the intruder for cover and
concealment.
2. Full-view fence - it is constructed in such a way that visual access is permitted through
the fence. Its advantages are that it allows the roving patrols and stationary guard to
keep the surrounding area of the installation under observation. On the other hand, it
allows the intruder to become familiar with the movements and time schedule of the
guard patrols thereby allowing him to pick the time that is advantageous on his part.
TYPES OF FULL VIEW FENCES
1. Chain link Fence
- it must be constructed 7 feet material excluding top guard.
- it must be of 9 gauges or heavier.
- the mesh openings are not to be larger tha 2 inchees per side.
- it should be twisted and barbed selvage at top and bottom.
2. Barbed Wire Fence
- standard barbed wire is twisted, double-strand, 12 gauge
wire with 4 point barbs sapces in an equal distance apart.
- should not be less than 7 feet high excluding the top guard.
3. Concertina Wire Fence

5
- standard concertina wire is commercially manufactured wire coil of high-strength steel barbed
wire clipped together at intervals to form a cylinder.
- 50 feet long and 3 feet in diamter.

PERIMETER BARRIER OPENING


1. Gates and Doors
2. Side walk elevators – these provide access areas within the perimeter barrier and should
be locked and guarded.
3. Utilities Opening- sewer, air intakes, exhaust tunnels and othe utility opening which
penetrate the barrier and which have cross sectional areas of 96 square inches o more should
be protected.
4. Clear Zones

Additional Protective Measures


1. Top Guard - additional overhang of barbed cuire placed on vertical perimeter fences
upward and outward with a 45-degree angle with 3 to 4 strands of barbed wires spaced
6 inches apart. This increases the protective height and prevents easy access.
2. Guard Control stations - this is normally provided at main perimeter entrances to
secure areas located out-of-doors and manned by guards on full time basis. Sentry
station should be near a perimeter for surveillance at the entrance,
3. Tower Guard - this is a house-like structure above the perimeter barriers. The higher
the tower, the more visibility it provides. It gives a psychological unswerving effect to
violators. By and large guard towers, whether permanent or temporary, must have a
corresponding support force in the event of need. Towers as well as guard control
stations should have telephones, intercoms, and if possible, two-way radios connected
to security headquarters or offices to call for reserves in the event of need.
4. Barrier Maintenance - Fencing barriers and protective walls should always be regularly
inspected by security. Any sign or attempts to break in should be reported for
investigation. Destruction of fences or sections thereof should be repaired immediately,
and guard vigilance should be increased.
5. Protection in Depth - In large open areas or ground where fencing or walling is
impractical and expensive, warning signs should be conspicuously placed. The depth
itself is protection Reduction of access roads, and sufficient notices to warn intruders
should be done. Use of animals, as guards and intrusion devices, can also be good as
barriers.
6. Signs and Notices - “Control signs” should be erected where necessary in the
management of unauthorized ingress to preclude accidental entry. Signs should be
plainly visible and legible from any approach and in an understood language or dialect.
PROTECTIVE LIGHTINGS
The idea that lighting can provide improve protection for people and facilities is as old
as civilization. Protective lighting is the single most cost-effective deterrent to crime because it
creates a psychological deterrent to the intruders.

Purpose of Protective Lighting


It provides sufficient illumination to the areas during hours of darkness.
Lighting can help improve visibility so that intruders can be seen and identified and, if
possible, apprehended.
It serves as a deterrent to would-be thieves.

6
Types of Protective Lighting
Continuous lighting - the most familiar type of outdoor security lighting, this is
designed to provide two specific results: glare projection or controlled lighting. It consists of a
series of fixed luminaries at range to flood a given area continuously during the hours of
darkness.
Glare projection type - it is being used in prisons and correctional institutions to
illuminate walls and outside barriers.
Controlled lighting - it is generally employed where, due to surrounding property
owners, nearby highways or other limitations, it is necessary for the light to be more precisely
focused.
Standby lighting - it is designed for reserve or standby use or to supplement
continuous systems. A standby system can be most useful to selectively light a particular area
on an occasional basis.
Movable or Portable lighting - this system is manually operated and is usually made
up of movable search or floodlights that can be located in selected or special locations which
will require lightning, only for short period of time.
Emergency lighting - this system is used in times of power failure or other
emergencies when other systems are inoperative.

General Types of Lighting Sources


Listed below are the general lighting sources that are mostly used in providing indoor or
outdoor lighting.
Incandescent lamp - it is the least expensive in terms of energy consumed and has the
advantage of providing instant illumination when the switch is on.
Mercury vapor lamp - it is considered more efficient that the incandescent and used
widespread in exterior lighting. This emits a purplish-white color, caused by an electric current
passing through a tube of conducting and luminous gas.
Metal halide - it has a similar physical appearance to mercury vapor but provides a light
source of higher luminous efficiency and better color rendition.
Fluorescent - this provides good color rendition, high lamp efficiency as well as long
life. However, it cannot project light over long distance and thus are not desirable as flood type
lights.
High-pressure sodium vapor - this has gained acceptance for exterior lighting of
parking areas, roadways, buildings and commercial interior installations. Constructed on the
same principle as mercury vapor lamps, they emit a golden white to light pink color and this
provide high lumen efficiency and relatively good color rendition.
Types of Lighting Equipment
Three types of lighting equipment are generally used or associated with security
lighting. These are:
Floodlights - these can be used to accommodate st outdoor security lighting needs, including
the mination of boundaries, fences and buildings and or the emphasis of vital areas or building.
Streetlights- these are lightning equipment received the most widespread notoriety for its
value in reducing crime.
Searchlights – these are highly focused incandescent lamp and are designed to pinpoint
potential trouble spots.

7
Fresnel lights – these are wide beam units, primary used to extend the illumination in long
horizontal strips to protect the approaches to the perimeter barrier. Fresnel projects a narrow,
horizontal beam that is approxiamately 180 degrees in the horizontal and from 15 to 30
degrees in the vertical plane.
PROTECTIVE ALARMS
Protective alarm is one of the important barriers in security. It assists the security in
detecting, impeding or dettering potential security threat in the installation. Its function is to
alert the security personnel for any attempt of intrusion into a protected area, building or
compound. Once an intruder tampers the circuitry, the beam or radiated waves of the alarm
system, it will activate an alarm signal.
On the other hand, the use of communication equipment in the installation helps
security in upgrading its operational efficiency and effectiveness.
Basic Parts of Alarm System
1. Sensor or trigger device - it emits the aural or visual signals or both.
2. Transmission line - a circuit, which transmits the message to the signaling apparatus.
3. Annunciator - the signaling system activates the alarm.

Protective Alarm System


1. Central Station System - a type of alarm where the control station is located outside
the plant or installation. When the alarm is sounded or actuated by a subscriber, the
central station notifies the police and other public safety agencies.
2. Proprietary system - centralized monitor of the proprietary alarm system is located in
the industrial firm itself with a duty operator. In case of alarm, the duty operator calls
whatever is the primary need; firefighters, police, an ambulance or a bomb disposal unit.
3. Local Alarm – This system consists of ringing up a visual or audible alarm near the
object to be protected. When an intruder tries to pry a window, the alarm threat goes off.
4. Auxiliary alarm - company-owned alarm systems with a unit in the nearest police
station so that in case of need, direct call is possible. The company maintains the
equipment and lines both for the company and those in the police, fire other emergency
agencies by special arrangement Radio, landlines, or cell phones can avail of the all of
the auxiliary system.

Kinds of Alarms
1. Audio Detection Device - it will detect any sound caused by attempted force entry. A
supersonic microphone speaker sensor is installed in walls, ceilings and floors of the
protected area.
2. Vibration Detection Device - it will detect any vibration caused by attempted force
entry. A vibration sensitive sensor is attached to walls, ceilings or floors of the protected
area.
3. Metallic foil or wire - it will detect any action that moves the foil or wire. An electrically
charge strips of tinfoil or wire is use windows or glass surfaces of the protected area.
4. Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that when a
physical object disturbs this beam, an alarm is activated.
5. Photoelectric or Electric Eye Device – an invisible/visible beam is emitted and when
this is disturbed or when an intruder breaks contact with the beam; it will activate the
alarm.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy