Module 5 Lea 3
Module 5 Lea 3
Cotabato City
Second Semester, SY 2021-2022
Criminology Department
Objectives:
After going through this module, you are expected to:
1. Explain the concept of the Integrated Security System
2. Reason out why the integration of security system is important
3. Describe the role of physical security in the system
N O T E: Read carefully and study the module before you answer the
assessment.
Preliminary Note
Integration means that security managers can create a tailored-fir security system within
their respective facilities, incorporating products to control access and security across one or
many sites at local, national, and even global levels. Integration makes monitoring, updating,
and reporting much easier and the business insight the systems provide means you can use
time and resources more efficiently and improve health and safety for personnel and visitors.
1
access to assets and areas via HR and activities directory systems and tracking assets and
personnel as needed.
PURPOSE AND IMPORTANCE OF INTEGRATING SECURITY SYSTEMS
In managing security, one solution does not fit all. Every organization or site has
different needs and priorities. Business owners and executives strive to take the necessary
steps forward to lead their business in the most optimal direction. While, profits, overhead,
personnel, and market improvement take much of their focus, we tend to forget one of the
most essential aspects of our business: security.
An integrated security system provides flexibility to incorporate what is needed only for
ease and comfortable use. Optimal security solutions that fit each business’s unique
requirements.
Integrated system means you can manage all aspects of security and access from one
place through one program. This is usually something you can control remotely often via app
on your smarhphone to give you extra ease of use. It is also easy to run reports, make
changes, view previous changes and by whom.
Here are some purpose of integrating security systems:
1. Efficieny – managing a business comes with an abundant amount tasks, one of them
being the company’s security. An integrated security system in any industry will allow
business to flourish more effectively and efficiently.
2. Centralization - integrated security system allows business security operations to
become more centralized. Management teams and business owners can now get a full
report from one area rather than needing to speak to all areas of the integrated security
system. This not only is a time saver, but also allows a more organized work flow for
businesses.
3. Loss Prevention - no matter what kind of industry one works in, they always have to be
prepared for the unexpected theft. Whether internal theft or external theft, it can be
overwhelming.
4. Real Time Monitoring - with multiple security systems, business management teams
are able to see what is going on within their facilities and areas of work instantly, if
needed. This also allows business owners to monitor their employee activities as it is
one of the most essential points in protecting their businesses from unwanted actions at
the workplace.
5. Conflict Resolution - integrated security systems come with a package of video
surveillance, access control, intrusion alarms, and uniformed guard services. All of
these elements will come forth if a problem were to arise in a workplace, whether it be
an internal/external burglary, attempted break-ins or just about any security threat that
can occur at a business.
6. Productivity - an integrated security System is a guarantee to boosting productivity in
the workspace. Study revealed that employee monitoring is being used to increase
customer satisfaction, improve employee performance and enhance productivity.
7. Business Savings - in the long run, having integrated security system will allow
business to save money and be protected Otherwise, in the case of a theft, burglary or
robbery, the business owners/management team would be heald liable for all the losses
with nowhere to turn to. With an integrated security system, business have multiple
outlets to look into and see what occurred, why it occurred or the possibility of those
events not even taking place at all.
2
Conceptually, the field of physical security has three important elements: the obstacles
to frustrate trivial attackers and delay serious ones; alarms, lighting CCTV and guard patrols to
make it likely that attacks will be noticed; and security response, to repel, catch or frustrate
attackers when an attack is detected.
Layers of Physical Security
In a well-designed physical security system, the three elements of physical security
must complement each other within the four layers of physical security, which are:
1. Environmental Design - the initial layer of security for a campus, building, office, or
physical space uses environmental design to deter threats. Some of the most common
examples are also the most basic - barbed wire, warning signs and fencing, concrete
bollards, metal barriers, vehicle height-restrictors, site lighting and trenches.
2. Mechanical and Electronic Access Control- includes gates, doors, and locks. Key
control of the locks becomes a problem with a large user population and any user
turnover. Keys quickly become unmanageable forcing the adoption of electronic access
control. Electronics access control easily manages large user populations, controlling
for user lifecycles times, dates, and individual access points.
3. Intrusion detection - monitors for attacks. It is less a preventative measure and more
of a response measure. Although some would argue that it is a deterrent. Intrusion
detection has a high incidence of false alarms.
4. Video monitoring - are more useful for incident verification and historical analysis. For
instance, if alarms are being generated and there is a camera in place, the camera
could be viewed to verify the alarms. In instances when an attack has already occurred
and a camera is in place at the point of attack, the recorded video can be reviewed
Physical Security also deals with things such as personnel, the environment, the facility and
its power supplies, fire protection, physical access, and even the protection of software,
hardware, and data files. The degree of physical security at any installation or command
depends on its physical characteristics, its vulnerability within the environment, and the type of
asset to be protected.
Minimum physical security requirements include four basic areas that an installation
must address:
1. physical security protection
2. physical access controls
3. data file protection
4. natural disaster protection
PHYSICAL BARRIERS
A barrier is any structure or physical device capable of restricting, deterring, delaying,
illegal access to an installation.
Generally, a barrier is use for the following purposes:
1. Define the physical limits of an area.
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of
intruders.
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control and vehicular traffic.
3
2. Structural barriers - these are features constructed by man regardless of their original
intent that tends to delay the intruder. Examples are walls, doors, windows, locks,
fences, safe, cabinets or containers etc.
3. Human barriers - persons being used in providing a guarding system or by the nature
of their employment and location, fulfill security functions. Examples are guards, office
personnel, shop workers, etc.
4. Animal barriers - animals are used in partially providing a guarding system. Dogs are
usually trained and utilized to serve as guard dogs. German shepherds are best suited
for security functions. Goose and turkeys could also be included. 5. Energy barriers - it
is the employment of mechanical, electrical, electronic energy that imposes a deterrent
to entry by the potential intruder or to provide warning to guard personnel. These are
protective lighting, alarm systems and any electronic devices used as barriers.
PERIMETER SECURITY
The main purpose of perimeter barrier is to aeny or impede access or exit of
unauthorized persons. Basically, it is the first line of defense of an installation. This is maybe in
the form of fences, building walls or even bodies of water. The function and location of the
facility itself usually determine the perimeter of the installation. If the facility is located in a city
whereby the building or enterprise occupies all the area where it is located, the perimeter may
be the walls of the building itself.
Lines of Physical Defense
1. First Line- includes perimeter fence or barrier
2. Second Line – include doors, floors, windows, walls, roofs and grills and other entries
to the buildings.
3. Third Line- include storage systems like steel cabinets, safes, vaults and interior files.
4
thing is time travel. This system provides for checking the actual time used by the vistor
against unknown time requirements.
b.) Visitor Identification and Movements Control – processing and control of visitor shall be
included in the PASS SYSTEM.
c.) Key Control – a system of controlling keys shall be advised and regulations covering the
disposal, storage or withdrawals, shall be issued and imposed.
d. Fire Prevention
PERIMETER FENCES
A fence is a freestanding structure designed to restrict or prevent movement across a
boundary. It is generally distinguished from a wall by the lightness of its construction: a wall is
usually restricted to such barriers made from solid brick or concrete, blocking vision as well as
passage
Types of Fences
1. Solid fence-constructed in such a way that visual access through the fence is denied.
Its advantage is that it denies the opportunity for the intruder to become familiar with the
personnel, activities and the time scheduled of the movements the guards in the
installation. On the other hand, it prevents the guards from observing the area around
the installation and it creates shadow that may be used by the intruder for cover and
concealment.
2. Full-view fence - it is constructed in such a way that visual access is permitted through
the fence. Its advantages are that it allows the roving patrols and stationary guard to
keep the surrounding area of the installation under observation. On the other hand, it
allows the intruder to become familiar with the movements and time schedule of the
guard patrols thereby allowing him to pick the time that is advantageous on his part.
TYPES OF FULL VIEW FENCES
1. Chain link Fence
- it must be constructed 7 feet material excluding top guard.
- it must be of 9 gauges or heavier.
- the mesh openings are not to be larger tha 2 inchees per side.
- it should be twisted and barbed selvage at top and bottom.
2. Barbed Wire Fence
- standard barbed wire is twisted, double-strand, 12 gauge
wire with 4 point barbs sapces in an equal distance apart.
- should not be less than 7 feet high excluding the top guard.
3. Concertina Wire Fence
5
- standard concertina wire is commercially manufactured wire coil of high-strength steel barbed
wire clipped together at intervals to form a cylinder.
- 50 feet long and 3 feet in diamter.
6
Types of Protective Lighting
Continuous lighting - the most familiar type of outdoor security lighting, this is
designed to provide two specific results: glare projection or controlled lighting. It consists of a
series of fixed luminaries at range to flood a given area continuously during the hours of
darkness.
Glare projection type - it is being used in prisons and correctional institutions to
illuminate walls and outside barriers.
Controlled lighting - it is generally employed where, due to surrounding property
owners, nearby highways or other limitations, it is necessary for the light to be more precisely
focused.
Standby lighting - it is designed for reserve or standby use or to supplement
continuous systems. A standby system can be most useful to selectively light a particular area
on an occasional basis.
Movable or Portable lighting - this system is manually operated and is usually made
up of movable search or floodlights that can be located in selected or special locations which
will require lightning, only for short period of time.
Emergency lighting - this system is used in times of power failure or other
emergencies when other systems are inoperative.
7
Fresnel lights – these are wide beam units, primary used to extend the illumination in long
horizontal strips to protect the approaches to the perimeter barrier. Fresnel projects a narrow,
horizontal beam that is approxiamately 180 degrees in the horizontal and from 15 to 30
degrees in the vertical plane.
PROTECTIVE ALARMS
Protective alarm is one of the important barriers in security. It assists the security in
detecting, impeding or dettering potential security threat in the installation. Its function is to
alert the security personnel for any attempt of intrusion into a protected area, building or
compound. Once an intruder tampers the circuitry, the beam or radiated waves of the alarm
system, it will activate an alarm signal.
On the other hand, the use of communication equipment in the installation helps
security in upgrading its operational efficiency and effectiveness.
Basic Parts of Alarm System
1. Sensor or trigger device - it emits the aural or visual signals or both.
2. Transmission line - a circuit, which transmits the message to the signaling apparatus.
3. Annunciator - the signaling system activates the alarm.
Kinds of Alarms
1. Audio Detection Device - it will detect any sound caused by attempted force entry. A
supersonic microphone speaker sensor is installed in walls, ceilings and floors of the
protected area.
2. Vibration Detection Device - it will detect any vibration caused by attempted force
entry. A vibration sensitive sensor is attached to walls, ceilings or floors of the protected
area.
3. Metallic foil or wire - it will detect any action that moves the foil or wire. An electrically
charge strips of tinfoil or wire is use windows or glass surfaces of the protected area.
4. Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that when a
physical object disturbs this beam, an alarm is activated.
5. Photoelectric or Electric Eye Device – an invisible/visible beam is emitted and when
this is disturbed or when an intruder breaks contact with the beam; it will activate the
alarm.