0% found this document useful (0 votes)
9 views9 pages

Chapter Four

Chapter Four discusses physical security management, emphasizing the assessment of security risks and the development of strategies to mitigate threats. It outlines various types of barriers, alarms, locks, and personnel security measures, highlighting their roles in protecting facilities and sensitive information. The chapter also details the principles of physical security and the importance of personnel investigations and education to prevent disloyalty.

Uploaded by

Mhae Villanueva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views9 pages

Chapter Four

Chapter Four discusses physical security management, emphasizing the assessment of security risks and the development of strategies to mitigate threats. It outlines various types of barriers, alarms, locks, and personnel security measures, highlighting their roles in protecting facilities and sensitive information. The chapter also details the principles of physical security and the importance of personnel investigations and education to prevent disloyalty.

Uploaded by

Mhae Villanueva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CHAPTER FOUR

PHYSICAL SECURITY

Physical Security Management

Professionals working in physical security management could be responsible for


assessing security risks and developing strategies to prevent or mitigate threats, such as
terrorist threats, fire or break-ins that can harm people and property. They also design
emergency response plans should these events occur, assess program effectiveness and
familiarize their coworkers with an organization's security protocol.

Information Security Management

One of the largest challenges to security management is through IT and computer


networked systems. Professionals working in this sector attempt to ensure the integrity of
individual or organizational data via tools used to classify information prevent unauthorized
access to networked systems and ward off computer viruses and other threats.

(BARRIERS, ALARMS, LIGHTING AND LOCKS)

Measures being used to define, protect and monitor property rights and assets. These
measures consist of barriers and devices that would detect, impede, and prevent unauthorized
access to equipment, facilities, material, and document and to safeguard them against
espionage, sabotage, damage, pilferage, embezzlement fraud or another dishonest criminal act.

PRINCIPLES OF PHYSICAL SECURITY

1. The type of access necessary will depend upon a number of variable factors and
therefore maybe achieved in a number of ways.

2. There is no impenetrable barrier

3. Defense-in-dept. is barrier after barrier

4. Delay ls provided against surreptitious and non-surreptitious entry

5. Each installation is different BARRIER Any structure or physical device capable of


restricting, deterring, delaying, illegal access to installation.

PURPOSE OF BARRIER

1. Define the physically limits of an area.


2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards.
5. Facilities and improve the control of vehicular traffic.
NATURAL BARRIERS

It includes the body of waters, mountains, marshes, ravines, deserts or other terrain that
are difficult to traverse. In addition, all those exist on earth as to water and land formation.

1. Waters
2. Mountains
3. Marshes
4. Ravines
5. Desserts

STUCTURAL BARRIERS

These are constructed by men or bar or delay entry.


HUMAN BARRIERS

Persons being used in providing guarding system or by nature of employment and location.

ANIMAL BARRIERS

Animals are being used in providing a guarding system

ENERGY BARRIERS

It is the employment of the mechanical; electrical energy imposes a deterrent to any illegal
intruder.

THREE LINES OF PHYSICAL DEFENSE

1. First line of defense perimeter

 fences/barriers

2. Second line of defense

 Doors

 Windows

 Walls AN Roofs.

 Grills and other entries to the building

3. Third lines of defense

 Storage System
 Steel cabinets

 Safes

 Vaults

PRINCIPLES OF PHYSICAL SECURITY

1. The type of access necessary will depend upon a number of variable factors and
therefore maybe achieved in a number of ways.

2. There is no impenetrable barrier

3. Defense-in-dept. is barrier after barrier

4. Delay is provided against surreptitious and non-surreptitious entry.

5. Each installation is different.

TYPES OF PERIMETER BARRIER OPENING

1. Gates and doors. If frequently used should be controlled by guard, while inside the
perimeter should be locked.

2. Sidewalk or utility elevator. It should be manned and lock at all times.

3. Utility opening. Sewer, air intake, exhaust tunnels should be protected by bar grills.

WHAT IS RESTRICTED AREA?

This refers to any area which personnel; vehicles are controlled for reason of security.
Such area is restricted in which provided by the security in the installation to maximize its
efficiency during security operation of the entire area.

TWO TYPES OF RESTRICTED AREAS

1. Exclusion area. A restricted area which contains a security interest to TOP SECRET
importance and which requires the highest degree of protection.

2. Limited area. A restricted area in which a lesser degree of control is required than in an
exclusion area but which the security interest would be compromised by uncontrollable
movement.
INCLUSION OF LIMITED AREA CONTROL

1. Interior area control. Refers to the time element of visitor’s arrival and departure while
in the course of transaction within the installation.

2. Visitors identification and movement control. PASS SYSTEM

3. Key control.

4. Fire prevention.

TYPES OF PERIMETER BARRIER AND ITS INCLUSION

 Fences

 Walls

 Bodies of water

TYPE OF FENCES

1. Solid fence. Visual access through fence is denied.

2. Full-view fence. It is constructed in such a way that visual access Is permitted.

TYPE OF FULL-VIEW FENSE

1. Chain link fence. Constructed of 7 feet material including top guard.

2. Barbed wire fence.

3. Concertina wire fence.

PROTECTIVE LIGHTING

Their single most cost-effective deterrent to crime because it creates a psychological


deterrent to the intruders.

PURPOSE OF PROTECTIVE LIGHTING

1. It provides sufficient illumination to areas during hours of darkness.

2. Lighting can help improve visibility so that intruder can be seen and identified and if
possible, apprehended.

3. It serves as deterrent to would be thieves.

TYPES OF PROTECTIVE LIGHTING

1. Continuous Lighting. Designed to provide rear projection or controlled lighting.

2. Standby Lighting. Light the particular area in an occasional basis.

3. Movable or Portable Lighting. This can be located in selected or special location which
will require lighting in short period of time.

4. Emergency Lighting. This system is use in times in power failure.

GENERAL TYPES OF LIGHTING SOURCES

1. INCANDESCENT LAMP Providing instant illumination when the switch is on.

2. MERCURY VAPOR LAMP - More efficient than incandescent and use wide spread in
exterior lighting.

3. METAL HALIDE - It has similar appearance in mercury vapor but provides a light source
of higher luminous efficiency.

4. FLOURESCENT -High lamp efficiency has long life.

5. HIGH- PRESSURE SODIUM VAPOR - It mixes a golden white to light pink color and
provide high lumen efficiency.

TYPES OF LIGHTING EQUIPMENT

1. FLOODLIGHTS Used for outdoor security lighting focused in vital areas in particular
building.

2. STREET LIGHTS Is lighting equipment that illuminates roadway, alley, its value in
reducing crime.

3. SEARCH LIGHTS - A design to pinpoint potential trouble spots.

4. FRESNEL LIGHTS -Are wide beam units that illuminates in long, horizontal strips to
protect the approaches to the perimeter barrier.

AREAS TO BE LIGHTED

1. Perimeter fence

2. Building face perimeter

3. Pedestrian and vehicle entrance

4. Parking area

5. Storage, large opened working area, pier, docks, and other sensitive areas.

PROTECTIVE ALARM

Are devices and contrivance installed inside and outside a facility or building to
compliment and provide additional security measure and operates the advertise entry into
protective areas. It signals alerts the security personnel to intrusion within the compound.

THREE BASIC PARTS OF ALARM SYSTEM


1. Sensor or trigger device - it emits the aural or visual signal or both.

2. Transmission Line a circuit which the message to the signaling apparatus.

3. Enunciator/Annunciator- it is the signaling9 system that activates the alarm.

TYPES OF PROTECTIVE ALARM SYSTEM

1. Central station system. A type of alarm where the control station is located.

2. Proprietary system. The alarm is located in industrial firm itself which activated the
presence of police, ambulance and other responding units.

3. Local alarm. Consist of ringing up a visual or audible near the object to be protected.

4. Auxiliary alarm. Company own alarm system with a link to the nearest police station
for immediate assistance.

KINDS OF ALARM

1. Audio Detection Device. Detect any sound post by force entry with the use of supersonic
microphone speaker sensor that installed in walls, ceiling, floors, of protective area.

2. Vibration Detection Device. Detect any vibration post by attempted entry.

3. Metallic foil or wire. Detect any actions that moves the foil or wire.

4. Laser Beam Alarm. A laser emitter fioods the wall or fencing with a beam so that the
beam is disturbed or cut, an alarm is activated.

5. Photoelectric or Electric Eye Device. An invisible beam is emitted and once it breaks it
will activate the alarm.

LOCKS

Are mechanical device used for fastening doors, chests and lids consisting essentially of
a volt guarded by a mechanism released by a key or a combination. It is designed entry into the
installation and safeguards the removal of materials contained therein.

TYPES OF LOCKS

1. Warded Locks. Does simplest form of lock is a ward lock which uses a vault containing
notch called talon.

2. Disc Tumbler Lock. Contains one or more pieces of metal of different height known as
tumblers.

3. Lever Locks, it is commonly installed in safe deposits boxes and are operated by means
of dial.

4. Cylinder Lock. Operated by a key on the outside and a knob in the inside.
5. Magnetic Locks. Similar in designed in cylinder locks to return to release the bolt which
pin needs a suitable magnetized key for alignment

6. Electromagnetic Locks. When the power is on and the door is lock, it beams operated by
electricity and which it will close by the magnetism.

7. Combination Locks. For installation in seek in bank vaults which has 1 million possible
combinations.

8. Code operated Locks. It can be open by pressing a series of button on proper sequences

9. Card operated Locks. Utilize card which are coded in notched, electromagnetic strips.
imbedded,

KEY CONTROL

Once an effective key control has been installed, positive control key must be gained and
maintained. This can be accomplished only if it is established in conjunction with the
installation of new locking devices. Methods in order to maintain effective key control

1. Key cabinet. Should be secure at all time

2. Key record. Must be set up record of all numbers which keys specific lock have been
Issued

3. Inventories. Should be made of all duplicator or duplicated

4. Audits. Should be made of all key control records 5. Daily report. Should be made to the
person responsible for a key control

TYPE OF KEYS

1. Change key- A specific key, which operates the locks and has a particular combination
of cuts which match the arrangement of the tumblers in the lucks

2. Sub-master key- a key that will open all the locks within a particular area or grouping in a
given facility

3. Master key- A special key capable of opening a series of lock

4. Grand master key- A key that will open everything in a system involving two or more
master key groups.

WHAT IS SECURITY CABINET?

The final line of defense at any facility is in the high storage where paper, records, plan
or cashable instrument, precious metal or other especially valuable assets are protected. These
security containers will be of a size quantity, which the nature of the business dictates.

THREE TYPES OF SECURITY CABINET

1. Safe- metallic containers used for the safekeeping documents or small items in an office or
installation.
2. Vault heavily constructed fire and burglar resistant containers usually a part of the building
structure used keep and protect cash, document and negotiable instrument.

3. File room-a cubicle in a building constructed lighter than a vault but of bigger size to
accommodate limited people to work on the records inside.

PERSONNEL SECURITY

Personnel security includes all the security measures designed to prevent unsuitable
individual or persons of doubtful loyalty to the government, from gaining access to classified
matter or to any facility, and to prevent appointment, or retention as employees of such
individuals. It is also composed of conducting personnel security investigation and security
education programs.

PERSONNEL SECURITY INVESTIGATION

Is an inquiry into the reputation, character, integrity, discretion, morals and loyalty of an
individual in order to determine a person's suitability for appointment or access to classified
matters?

MOTIVES THAT CAUSE PEOPLE TO BE DISLOYAL

1. Revenge

2. Material gain

3. Prestige

4. Ideological belief

5. Friendship

WEAKNESS THATCAUSE PEOPLE TO BE DISLOYAL

a. Weakness of character

b. Jealousy

c. Gullibility

d. Indebtedness
e. Investment

f. Addiction to narcotics

g. Alcoholism

h. Gambling problems

i. Moral depravity such lesbianism and homosexuality

SEVEN PHASES OF SECURITY EDUCATION

1. Initial interview it is the first contact with security and should be formally conducted.

2. Training conference it is normally held in the training period conducted for at least a
period of four hours; its concern is to reiterate to employees that security is an additional
burden imposed on them as part of the company.

3. Refresher conference it reminds individuals of their job responsibility.

4. Security reminders it commonly manifested in office memorandum

5. Security promotion - it is positive effort to sell security or make the employees more
involved in the implementation of security measures

6. Special interview- It is conducted with the aid of senior company official to facilitate
compliance by means of example.

7. Debriefing serve to place the person on special notice of his continuing responsibility to
protect classified information which he has knowledge of.

PHASES OF SECURITY EDUCATION

1. Security promotion- it is positive effort to sell security or make the employees more
involved in the implementation of Security measures.

2. Special interview it is conducted with the aid of senior company official to facilitate
compliance by means of example. Debriefing- serve to place the person on special
notice of his responsibility information which he has knowledge of. continuing to protect
classified

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy