Lea 3 Prefinal Module
Lea 3 Prefinal Module
PHYSICAL SECURITY
4. Video monitoring – are some useful for incident verification and historical
analysis. For instance, if alarms are being generated and there is a camera
place, the camera could be viewed to verify the alarms. In instances when an
attack has already occurred and a camera is in place at the point of attack, the
recorded video can be reviewed.
Define Barrier
- Barrier can be defined as any structure of physical device capable of
restricting, deterring, delaying of illegal access to an installation.
Type of Barriers
1. Natural Barriers – it includes bodies of waters, mountains, marshes, ravines,
deserts or other terrain that are difficult to traverse.
Type of Fences
1. Solid Fence – constructed in such a way that visual access through the fence is
denied. Its advantage is that it denies the opportunity for the intruder to
become familiar with the personnel, activities and the time scheduled of the
movements of the guards in the installation. On the other hand, it prevents
the guards from observing the areas around the installation and it creates
shadow that may be used by the intruder for cover and concealment.
Note: the distance between strands must not exceed 6 inches at least one wire will be
interlaced vertically and midway between posts.
3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional areas of
96 square inches or more should be protected by the guards.
3. Tower Guard – this is house-like structure above the perimeter barriers. The
higher the tower, the more visibility it provides. It gives psychological
unswerving effect to violators by and large guard towers, whether permanent
or temporary must have a corresponding support force in the event of need.
Towers as well as guard control stations should have telephones, intercoms
and if possible two-way radios connected to security headquarters or office to
call for reserves in the event of need.
Protecting Lighting
- Lighting can provide improve protection for people and facilities is as old as
civilization. Protective lighting is the single most cost-effective deterrent to
crime because it creates a psychological deterrent to the intruders.
3. Metal Halide – it has similar physical appearance of higher mercury vapor but
provides a light source of higher luminous efficiency and better color
rendition.
4. Fluorescent – this provides good color rendition, high lamp efficiency as well
as long life. However, it cannot project light over long distance and thus are
not desirable as flood type lights.
5. High-pressure sodium vapor – this has gained acceptance for exterior lighting
of parking areas, roadways, building and commercial interiors installations.
Constructed on the same principle as mercury vapor lamps, they emit a
golden white to light pink color and this provide high lumen efficiency and
relatively good color rendition.
2. Street lights – these are lighting equipment received the most widespread
notoriety for its value in reducing crime.
3. Search lights – these are highly focused incandescent lamp and are designed
to pinpoint potential trouble spots.
4. Fresnel lights – these are wide beam units, primary used to extent the
illumination in long, horizontal strips to protect the approaches to the
perimeter barrier. Fresnel projects a narrow, horizontal beam that is the
degrees in the horizontal and from 15 to 30 degree in the vertical plane.
Areas to be lighted:
a) Perimeter fence
b) Building face perimeter
c) Pedestrian and vehicle entrance
d) Parking area
e) Storage, large opened working areas, piers, docks and other sensitive areas.
Kinds of Alarms
1. Audio Detection Device – it will detect any sound caused by attempted force
entry. A supersonic microphone speaker sensor is installed in walls, ceiling and
floors of the protected area.
2. Vibration Detection Device – it will detect any vibration caused by attempted
force entry. A vibration sensitive sensor is attached to walls, ceilings or floors
of the protected area.
3. Metallic foil or wire – it will detect any action that moves the foil or wire. An
electricity charge strips of tinfoil or wire is used in the doors, windows or glass
surfaces of the protected area.
4. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so
that this beam is disturbed by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device – an invisible/visible beam is emitted and
when this is disturbed or when an intruder breaks contact with the beam, it
will activate the alarm.
Utilization of Alarm Devices
a) Nature of the area or installation
b) Criticality of the area or complex
c) Vulnerability of the area or complex
d) Accessibility
e) Construction and type of building
f) Hours of normal operation
g) Availability of other type or protection
h) Initial and recurring cost of installed alarm system
i) Design and salvage value of desired equipment
j) Response time of the security force and local police
k) Saving in manpower and money for a period of time if alarm is used.
Lock Defined
- A lock is defined as a mechanical, electrical, hydraulic or electronic device
designed to prevent entry into a building, room, container or hiding place.
Types of Locks:
1. Key-operated mechanical lock – it uses some sort of arrangement of internal
physical barriers (wards tumblers) which prevent the lock from operating
unless they are properly aligned. The key is the device used to align these
internal barriers so that the lock may be operated.
Three (3) Types of Key-Operated Lock:
Disc or Wafer tumbler mechanism
Pin tumbler mechanism
Lever tumbler mechanism
2. Padlock – a portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.
3. Combination lock – instead of using the key to align the tumblers, the
combination mechanism uses numbers, letters or other symbols as reference
point which enables an operator to align them manually.
4. Code-operated lock – a type of lock that can be opened by pressing a series of
numbered button in the proper sequence.
5. Electrical lock – a type of lock that can be opened and closed remotely by
electrical means.
6. Card-operated lock – a type of lock operated by a coded card.
Key Defined
- A key is a device which is used to open a door. A key consist of two parts: the
BLADE, which is inserted into the lock and the BOW, left protruding so that
torque can be applied. The blade of a key is normally designed to open one
specific lock, although master keys are designed to open sets of similar locks.
Type of Keys
a) Change Key – Is specific key, which operates the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.
b) Sub-master Key – a key that will open all the lock within a particular area or
grouping in a given facility.
c) Master Key – a special key capable of opening a series of lock.
d) Grand Master Key – a key that will open everything in a system involving two
or more master key groups.
Security Cabinet
- The final line of defense at any facility is in the high security storage where
papers, records, plan or cashable, instrument, precious metals or other
especially valuable assets are protected. These security containers will be of a
size and quantity, which the nature of the business dictates.
In protecting property, it is essential to recognize that protective containers
are
designed to secure against burglary or fire. Each type of equipment has a
specialized function and it will depend the owner of the facility which type has
is going to use.
Lesson 6
Document or Information Security
Document Security
- It is the protector of records from its entire document life cycle. It also
connotes in this context the safeguarding classified matters.
- In government view, document and information is based on the premises that
the government has the right and duties to protect official papers from
unauthorized and improper disclosure.
2. Integrity
In information security, integrity means that data cannot be created, changed
or deleted
without authorization. It also means that data stored in one part of a database system
is in agreement with other related data stored in another part of the database system.
For example a loss of integrity can occurs when a database system is not
properly shut down
before maintenance is performed or the database server suddenly loses electrical
power. A loss also occurs when an employee accidentally or with malicious intent,
delete’s important data files. A loss of integrity can occurs if a computer virus released
onto the computer.
3. Availability
The concept of availability means that the information, the computing
systems used to
process the information and the security controls used to protect the information are
all available and functioning correctly when the information is needed. The opposite of
availability is denial service.