Chapter Four
Chapter Four
PHYSICAL SECURITY
Measures being used to define, protect and monitor property rights and assets. These
measures consist of barriers and devices that would detect, impede, and prevent unauthorized
access to equipment, facilities, material, and document and to safeguard them against
espionage, sabotage, damage, pilferage, embezzlement fraud or another dishonest criminal act.
1. The type of access necessary will depend upon a number of variable factors and
therefore maybe achieved in a number of ways.
PURPOSE OF BARRIER
It includes the body of waters, mountains, marshes, ravines, deserts or other terrain that
are difficult to traverse. In addition, all those exist on earth as to water and land formation.
1. Waters
2. Mountains
3. Marshes
4. Ravines
5. Desserts
STUCTURAL BARRIERS
Persons being used in providing guarding system or by nature of employment and location.
ANIMAL BARRIERS
ENERGY BARRIERS
It is the employment of the mechanical; electrical energy imposes a deterrent to any illegal
intruder.
fences/barriers
Doors
Windows
Walls AN Roofs.
Storage System
Steel cabinets
Safes
Vaults
1. The type of access necessary will depend upon a number of variable factors and
therefore maybe achieved in a number of ways.
1. Gates and doors. If frequently used should be controlled by guard, while inside the
perimeter should be locked.
3. Utility opening. Sewer, air intake, exhaust tunnels should be protected by bar grills.
This refers to any area which personnel; vehicles are controlled for reason of security.
Such area is restricted in which provided by the security in the installation to maximize its
efficiency during security operation of the entire area.
1. Exclusion area. A restricted area which contains a security interest to TOP SECRET
importance and which requires the highest degree of protection.
2. Limited area. A restricted area in which a lesser degree of control is required than in an
exclusion area but which the security interest would be compromised by uncontrollable
movement.
INCLUSION OF LIMITED AREA CONTROL
1. Interior area control. Refers to the time element of visitor’s arrival and departure while
in the course of transaction within the installation.
3. Key control.
4. Fire prevention.
Fences
Walls
Bodies of water
TYPE OF FENCES
PROTECTIVE LIGHTING
2. Lighting can help improve visibility so that intruder can be seen and identified and if
possible, apprehended.
3. Movable or Portable Lighting. This can be located in selected or special location which
will require lighting in short period of time.
2. MERCURY VAPOR LAMP - More efficient than incandescent and use wide spread in
exterior lighting.
3. METAL HALIDE - It has similar appearance in mercury vapor but provides a light source
of higher luminous efficiency.
5. HIGH- PRESSURE SODIUM VAPOR - It mixes a golden white to light pink color and
provide high lumen efficiency.
1. FLOODLIGHTS Used for outdoor security lighting focused in vital areas in particular
building.
2. STREET LIGHTS Is lighting equipment that illuminates roadway, alley, its value in
reducing crime.
4. FRESNEL LIGHTS -Are wide beam units that illuminates in long, horizontal strips to
protect the approaches to the perimeter barrier.
AREAS TO BE LIGHTED
1. Perimeter fence
4. Parking area
5. Storage, large opened working area, pier, docks, and other sensitive areas.
PROTECTIVE ALARM
Are devices and contrivance installed inside and outside a facility or building to
compliment and provide additional security measure and operates the advertise entry into
protective areas. It signals alerts the security personnel to intrusion within the compound.
1. Central station system. A type of alarm where the control station is located.
2. Proprietary system. The alarm is located in industrial firm itself which activated the
presence of police, ambulance and other responding units.
3. Local alarm. Consist of ringing up a visual or audible near the object to be protected.
4. Auxiliary alarm. Company own alarm system with a link to the nearest police station
for immediate assistance.
KINDS OF ALARM
1. Audio Detection Device. Detect any sound post by force entry with the use of supersonic
microphone speaker sensor that installed in walls, ceiling, floors, of protective area.
3. Metallic foil or wire. Detect any actions that moves the foil or wire.
4. Laser Beam Alarm. A laser emitter fioods the wall or fencing with a beam so that the
beam is disturbed or cut, an alarm is activated.
5. Photoelectric or Electric Eye Device. An invisible beam is emitted and once it breaks it
will activate the alarm.
LOCKS
Are mechanical device used for fastening doors, chests and lids consisting essentially of
a volt guarded by a mechanism released by a key or a combination. It is designed entry into the
installation and safeguards the removal of materials contained therein.
TYPES OF LOCKS
1. Warded Locks. Does simplest form of lock is a ward lock which uses a vault containing
notch called talon.
2. Disc Tumbler Lock. Contains one or more pieces of metal of different height known as
tumblers.
3. Lever Locks, it is commonly installed in safe deposits boxes and are operated by means
of dial.
4. Cylinder Lock. Operated by a key on the outside and a knob in the inside.
5. Magnetic Locks. Similar in designed in cylinder locks to return to release the bolt which
pin needs a suitable magnetized key for alignment
6. Electromagnetic Locks. When the power is on and the door is lock, it beams operated by
electricity and which it will close by the magnetism.
7. Combination Locks. For installation in seek in bank vaults which has 1 million possible
combinations.
8. Code operated Locks. It can be open by pressing a series of button on proper sequences
9. Card operated Locks. Utilize card which are coded in notched, electromagnetic strips.
imbedded,
KEY CONTROL
Once an effective key control has been installed, positive control key must be gained and
maintained. This can be accomplished only if it is established in conjunction with the
installation of new locking devices. Methods in order to maintain effective key control
2. Key record. Must be set up record of all numbers which keys specific lock have been
Issued
4. Audits. Should be made of all key control records 5. Daily report. Should be made to the
person responsible for a key control
TYPE OF KEYS
1. Change key- A specific key, which operates the locks and has a particular combination
of cuts which match the arrangement of the tumblers in the lucks
2. Sub-master key- a key that will open all the locks within a particular area or grouping in a
given facility
4. Grand master key- A key that will open everything in a system involving two or more
master key groups.
The final line of defense at any facility is in the high storage where paper, records, plan
or cashable instrument, precious metal or other especially valuable assets are protected. These
security containers will be of a size quantity, which the nature of the business dictates.
1. Safe- metallic containers used for the safekeeping documents or small items in an office or
installation.
2. Vault heavily constructed fire and burglar resistant containers usually a part of the building
structure used keep and protect cash, document and negotiable instrument.
3. File room-a cubicle in a building constructed lighter than a vault but of bigger size to
accommodate limited people to work on the records inside.
PERSONNEL SECURITY
Personnel security includes all the security measures designed to prevent unsuitable
individual or persons of doubtful loyalty to the government, from gaining access to classified
matter or to any facility, and to prevent appointment, or retention as employees of such
individuals. It is also composed of conducting personnel security investigation and security
education programs.
Is an inquiry into the reputation, character, integrity, discretion, morals and loyalty of an
individual in order to determine a person's suitability for appointment or access to classified
matters?
1. Revenge
2. Material gain
3. Prestige
4. Ideological belief
5. Friendship
a. Weakness of character
b. Jealousy
c. Gullibility
d. Indebtedness
e. Investment
f. Addiction to narcotics
g. Alcoholism
h. Gambling problems
1. Initial interview it is the first contact with security and should be formally conducted.
2. Training conference it is normally held in the training period conducted for at least a
period of four hours; its concern is to reiterate to employees that security is an additional
burden imposed on them as part of the company.
5. Security promotion - it is positive effort to sell security or make the employees more
involved in the implementation of security measures
6. Special interview- It is conducted with the aid of senior company official to facilitate
compliance by means of example.
7. Debriefing serve to place the person on special notice of his continuing responsibility to
protect classified information which he has knowledge of.
1. Security promotion- it is positive effort to sell security or make the employees more
involved in the implementation of Security measures.
2. Special interview it is conducted with the aid of senior company official to facilitate
compliance by means of example. Debriefing- serve to place the person on special
notice of his responsibility information which he has knowledge of. continuing to protect
classified