Sei sulla pagina 1di 56

 Security and safety are the second level of the

hierarchy of human needs according to


Abraham Maslow. Both are on top of the
physiological needs, which include air, food
shelter, excretion among others. The need
for security and safety encompasses the
body, health, family, resources and property.
 Is a state or condition of being secured; there
is freedom from fear, harm, danger, loss,
destruction, or damages.
 Security guard – is a person who offers or
renders personal service to watch or secure
either a residence or business establishment or
both for hire or compensation

 Security guard force – is a group of force selected


men trained or grouped into functional unit for
the purpose of protecting operational processes
from those disruptions which would impede
efficiency or halt operation at a particular plant,
facility, installation or special activity
 Refers to the natural, physical, social, political
and industry that surround the organization.
 This is classified as a base resource as it
provides the opportunity and inspiration for
the creation of an organization.
 Refers to information or data about employees,
policies, plans, projects, designs, patterns,
business application software, production, sales
and other business transaction data.
 It is the product of an idea created or perceived
by human intelligence and imagination that is
expressed in writing or orally. It is transmitted
from the creator to another person who has the
skill to concretize these ideas into products or
services.
 This focus with the physical measures
adopted to prevent unauthorized access to
equipment, facilities, material and documents
and to safeguard them against espionage,
sabotage, damage, loss and theft.
 These measures consist of barriers and
devices that would detect, impede and
prevent unauthorized access to equipment.
 The type of access necessary will depend
upon a number of a variable factors and
therefore may be achieved in a number of
ways.
 There is no impenetrable barrier.
 Defense-in depth is barriers after barriers
 Delay is provided against surreptitious
(secret) and non-surreptitious entry.
 Each installation is different
 Can be defined as those measures taken by
an installation or unit to protect itself against
sabotage, espionage, or subversion and at
the same time provide freedom of action in
order to provide the installation of the unit
with the necessary flexibility to accomplish its
mission.
 Industry security - a type of security to business
groups engaged in industries like manufacturing,
assembling, research and development,
processing, warehousing and even agriculture. It
may also mean the business of providing
security.
 Hotel security – a type of security applied to
hotels where its properties are protected from
pilferage, loss, damage and function in the hotel
restaurant are not disturbed and troubled by
outsiders or the guest themselves. This type of
security employs hose detectives, uniforms,
guard supervisor and insures that the hotel guest
and their personal effects are safeguard.
 Bank security – this type of security is
concern with the bank operations. Its main
objectives are the protection of bank cash
assets, its personnel and clientele. Security
personnel are trained to safeguard bank and
assets while in the storage.
 VIP security – a type of security applied for
the protection of top-ranking officials of the
government or private entity, visiting persons
of illustrious standing and foreign dignitaries.
 School security – a type of security that is
concern with the protection of students, faculty
member and school properties. Security
personnel are trained to protect the school
property from theft, vandals handling campus
riot and detecting the use of intoxicated drugs
and alcohol by the students.
 Supermarket or mails security – a type of security
which is concern with the protection of the
stores, warehouses, storage, its immediate
premises and properties as well as the
supermarket personnel and customers.
 A barrier can be defined as any structures or
physical device capable of restricting,
deterring, delaying illegal access to an
installation.
 Defined the physical limits of an area
 Create physical and psychological deterrent
to unauthorized entry
 Prevent penetrations there in or delay
intrusion, thus, facilitating apprehension of
intruders
 Assist in more efficient and economical
employment of guards
 Facilitate and improve the control and
vehicular traffic.
 Natural barriers – includes bodies of water,
mountains, marshes, ravines, deserts or other terrain
that are difficult to traverse
 Structural barriers – these are the futures constructed
by man regardless of their original intent that tends
to delay the intruder.
 Human barriers – persons being used in providing a
guarding system or by the nature of their
employment and location, fulfill security functions.
 Animal barriers – animals are used in partially
providing a guard system. Dogs are usually trained
and utilized to serve as guard dogs.
 Energy barriers – it is the employment of mechanical,
electrical, electronic energy imposes deterrent to
entry by the potential intruder or to provide warning
to guard personnel.
 Any area in which personnel or vehicles are
controlled for reasons of security.
 Restricted area is established to provide
security for any installation or facilities and to
promote efficiency of security operations and
economy in the use of security personnel.
 Restricted area was established to permit
different degrees of security within the same
installation or facilities.
 Exclusion area – restricted area contains
security interest to TOP SECRET matters, and
which requires the highest degree of
protection
 Limited area control – restricted area in which
a lesser degree of security is required than in
an exclusion area but security interest would
be comprised by uncontrolled movement
 It is the protection of the installation’s inner
and the immediate vicinity.
 The main purpose of perimeter barriers is to
deny or impede access or exit of
unauthorized person.
 Solid Fence – constructed such away the
visual access through the fences is denied

 Full-view Fence – constructed in such away


that visual access is permitted through the
fence
 Chain link fence
 Barbed wire fence
 Concentrating wire fence
 The idea that lighting can provide protection
for people and facilities especially during
darkness.
 Continuous lighting
 Standby lighting
 Movable or portable lighting
 Emergency lighting
 Protective alarms are one of the important
barriers in security.
 Its function is to alert the security personnel
for any attempt intrusion into a protected
area, building or compound.
 Sensor or trigger device – it emits the aural or
visual or both
 Transmission line – a circuit which transmit
the message to the signaling apparatus
 Enunciator – it is the signaling system that
activates the alarm
 Central station
 Proprietary system
 Local alarm
 Auxiliary alarm
 Audio detection device
 Vibration detection device
 Metallic foil or wire
 Laser beam alarm
 It is one of the most widely used physical
security devices in the asset protection
program of installation
 A lock is defined as mechanical, electrical,
hydraulic or electronic devices. Designated
to prevent entry to a building, room,
container or hiding places
Key-operated
Mechanical lock
 It uses some sort of arrangement of internal
physical barriers(wards tumblers) which prevent
the lock from operating unless they are properly
aligned . The key is the device used to align
these internal barriers so that the lock may be
operated.
Padlock
 A portable and detachable lock having a sliding
hasp which passes through a staple ring and is
then made fasten or secure
Combination lock
 Instead of using the key align the tumblers the
combination mechanism uses numbers, letters or
the other symbols as reference point which
enables an operator to align them manually.
Code-operator lock
 A type of lock that can open by pressing a series
of number in proper sequence.
Electrical Lock
 A type of lock that can be opened and closed
remotely by electrical means.
 Card Operated Lock
 A type of lock operated by a coded card.
Change key
 A specific key which operate the lock and has particularly
combination of cuts which match the arrangement of the
tumbler in the lock.
Sub-master key
 A key that will open all the lock within a particularly area
or grouping in a given facility.
Grand master key
 A key that will open everything in a system two or more
master key groups.
Key control
 Once an effective key control has been installed, positively
control of all keys must be gained and maintained. This
can be accomplished only if it is establish in conjunction
with the installation of new locking devices.
 Art. 304 (revised penal code) possession of picklocks
or similar tools .
 Any person who shall without lawful cause have in
possession of picklocks or similar tools especially to
the commission of the crime robbery , shall be
punishable by arrest to mayor in its minimum period.
The same penalty shall be imposed upon any person
who shall make such tool. If the offender is a
locksmith, shall suffer the penalty of prison
correctional in its medium and maximum period.
 Art.305 (RPC).false key
 The tool mentioned in the next proceeding articles
genuine keys stolen to the owner
 Any key other than those intended by the owner for
use in the lock forcibly opened by the offender .
 The final line defense at any facility is in the high
security storage where papers , records, plans ,
or cashable instrument , precious metals or other
especially valuable assets are protected . This
security will be of a size and quantity, which the
nature of the business dictates.
 In protecting property, it is essential to recognize
that protective container are designed to secure
against burglary or fire. Each type of equipment
has a specialize function and it will depend on
the owner of the facility which type has is going
to use.
1. Safe
 A metallic container used for the safekeeping
of documents or small items in an office or
installation. Safe can be classified as either
robbery or burglary resistance depending
upon the use and need.
 Its weight must be at least 750lbs. and
should be anchored to a building structure.
 Its body should at least one inch thick steel.
2. Vault
 Heavily constricted fire and burglar resistance
container usually a part of the building structure
used to keep and protect the cash, documents
and negotiable instruments. Vaults are bigger
than safe but smaller than a file room.
 The vault door should be made of steel at least 6
inches in thickness.
 The vault walls, ceiling, floor reinforce concrete
at least 12 inches in thickness.
 The vault must be resistive up to 6 hours.
3. File room
 A cubicle in a building constructed a little
lighter than a vault but of the bigger size to
accommodate limited people to work on the
record inside.
 The file room should at most 12 feet high.
 It must have a watertight door and at least
fire proof for one hour.
 Badge must be tamper-resistant
 They should contain a clear and recent
photograph of the bearer
 The photograph should be at least 1 inch
square and should be updated every two or
three years or when there is a significant
change in appearance
 Should additionally contain vital statistics
such as date of birth, height, weight, color of
hair and eyes, gender and thumbprints
 Personal recognition
 Artificial recognition
 Single pass system
 The badge or pass coded authorization to enter
specific areas is issued to an employee who keeps it
in his possession until the authorization is terminates
 Pass exchange system
 An exchange takes place at the entrance of each
controlled area. Upon leaving the personnel
surrenders his badge or passes and retrieve back his
basic identification
 Multiple pass system
 This provides an extra measure of security by
requiring that an exchange take place at the entrance
of each restricted area.
 The system should have complete record of
all badges and identification card issued
 The supervisor required to check the badges
from time to time to maintain accuracy and
efficiency of the operation
 Passes and badges lost should immediately
validated
 Visitor’s logbook
 Photograph
 Escort
 Visitor entrance
 Time travelled
 Includes all the security measures designed
to prevent unsuitable individuals or persons
of doubtful loyalty to the government from
gaining access to classified matter or to any
security facilities, and to prevent
appointment, or retention as employees of
such individuals.
 Personnel security generally embraces such
security measures as personnel security
investigation, security orientation and
indoctrination and security education as will
ensure the prevention of unsuitable
individuals or persons of doubtful loyalty to
the government, from gaining access to
classified matter or being appointed,
employed or retained as employees.
 Just any other technique, security must start
from a given foundation or basic shall be
referred to as the principles of security. Are
normally disseminated by regulation or
directive to ensure uniformity of purpose
,logical and similar methods of operation can
appropriate and continuous placement of
responsibility .
 Material that a government body claims is
sensitive information that requires protection of
confidentiality, integrity, or availability that
required security clearance.
 Information Sensitivity-is a control of access to
information or knowledge that might result in
loss of an advantage or level of security if
disclosed to others.
 Security Clearance-a status granted to
individuals allowing them to access to classified
information or to restricted areas after
completion of thorough background check.
 Restricted Area-a zone established by a
sanctioning body to prohibit specific activities
in a specific area.
 Background Check-the process of looking up
and compiling criminal records, commercial
records and financial records of an individual
organization.
E.g. Employment screening, Loyalty check
 National
 Local
 Barangay
 The term “Need to Know”, when used by
government and other organizations, describes
the restriction of data which is considered very
sensitive. Under need-to-know restrictions, even
if one has all the necessary official approvals to
access certain information, one would not be
given access to such information, or read into a
clandestine operation, unless one has a specific
need to know, that is, access to the information
must be nessesary for the conduct of one’s
official duties. No one is supposed to be given
an access to the need to know even when it
comes to the rank and position of an individual.
 Top Secret (YELLOW) is the highest form of
classified information. Information is further
compartmented so that specific access using a
code word after top secret is a legal way to hide
collective and important information. Such
material would cause “exceptionally grave
damage” to national security if made publicly
available.
 Secret (RED)-it is desired that no document be
released which refers to experiments with
humans and might have adverse effect on public
opinion or result in legal suits. Documents
covering such work field should be classified
‘secret’.
 Secret material would cause “serious damage”
to national security if it were publicly
available.
 Confidential (BLUE)material would cause
damage or prejudicial to national security if
publicly available.
 Restricted material would cause “undesirable
effects” if publicly available.
 Official material forms the generality of
government business, public service delivery
and commercial activity.

Potrebbero piacerti anche