Abraham Maslow. Both are on top of the physiological needs, which include air, food shelter, excretion among others. The need for security and safety encompasses the body, health, family, resources and property. Is a state or condition of being secured; there is freedom from fear, harm, danger, loss, destruction, or damages. Security guard – is a person who offers or renders personal service to watch or secure either a residence or business establishment or both for hire or compensation
Security guard force – is a group of force selected
men trained or grouped into functional unit for the purpose of protecting operational processes from those disruptions which would impede efficiency or halt operation at a particular plant, facility, installation or special activity Refers to the natural, physical, social, political and industry that surround the organization. This is classified as a base resource as it provides the opportunity and inspiration for the creation of an organization. Refers to information or data about employees, policies, plans, projects, designs, patterns, business application software, production, sales and other business transaction data. It is the product of an idea created or perceived by human intelligence and imagination that is expressed in writing or orally. It is transmitted from the creator to another person who has the skill to concretize these ideas into products or services. This focus with the physical measures adopted to prevent unauthorized access to equipment, facilities, material and documents and to safeguard them against espionage, sabotage, damage, loss and theft. These measures consist of barriers and devices that would detect, impede and prevent unauthorized access to equipment. The type of access necessary will depend upon a number of a variable factors and therefore may be achieved in a number of ways. There is no impenetrable barrier. Defense-in depth is barriers after barriers Delay is provided against surreptitious (secret) and non-surreptitious entry. Each installation is different Can be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage, or subversion and at the same time provide freedom of action in order to provide the installation of the unit with the necessary flexibility to accomplish its mission. Industry security - a type of security to business groups engaged in industries like manufacturing, assembling, research and development, processing, warehousing and even agriculture. It may also mean the business of providing security. Hotel security – a type of security applied to hotels where its properties are protected from pilferage, loss, damage and function in the hotel restaurant are not disturbed and troubled by outsiders or the guest themselves. This type of security employs hose detectives, uniforms, guard supervisor and insures that the hotel guest and their personal effects are safeguard. Bank security – this type of security is concern with the bank operations. Its main objectives are the protection of bank cash assets, its personnel and clientele. Security personnel are trained to safeguard bank and assets while in the storage. VIP security – a type of security applied for the protection of top-ranking officials of the government or private entity, visiting persons of illustrious standing and foreign dignitaries. School security – a type of security that is concern with the protection of students, faculty member and school properties. Security personnel are trained to protect the school property from theft, vandals handling campus riot and detecting the use of intoxicated drugs and alcohol by the students. Supermarket or mails security – a type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers. A barrier can be defined as any structures or physical device capable of restricting, deterring, delaying illegal access to an installation. Defined the physical limits of an area Create physical and psychological deterrent to unauthorized entry Prevent penetrations there in or delay intrusion, thus, facilitating apprehension of intruders Assist in more efficient and economical employment of guards Facilitate and improve the control and vehicular traffic. Natural barriers – includes bodies of water, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse Structural barriers – these are the futures constructed by man regardless of their original intent that tends to delay the intruder. Human barriers – persons being used in providing a guarding system or by the nature of their employment and location, fulfill security functions. Animal barriers – animals are used in partially providing a guard system. Dogs are usually trained and utilized to serve as guard dogs. Energy barriers – it is the employment of mechanical, electrical, electronic energy imposes deterrent to entry by the potential intruder or to provide warning to guard personnel. Any area in which personnel or vehicles are controlled for reasons of security. Restricted area is established to provide security for any installation or facilities and to promote efficiency of security operations and economy in the use of security personnel. Restricted area was established to permit different degrees of security within the same installation or facilities. Exclusion area – restricted area contains security interest to TOP SECRET matters, and which requires the highest degree of protection Limited area control – restricted area in which a lesser degree of security is required than in an exclusion area but security interest would be comprised by uncontrolled movement It is the protection of the installation’s inner and the immediate vicinity. The main purpose of perimeter barriers is to deny or impede access or exit of unauthorized person. Solid Fence – constructed such away the visual access through the fences is denied
Full-view Fence – constructed in such away
that visual access is permitted through the fence Chain link fence Barbed wire fence Concentrating wire fence The idea that lighting can provide protection for people and facilities especially during darkness. Continuous lighting Standby lighting Movable or portable lighting Emergency lighting Protective alarms are one of the important barriers in security. Its function is to alert the security personnel for any attempt intrusion into a protected area, building or compound. Sensor or trigger device – it emits the aural or visual or both Transmission line – a circuit which transmit the message to the signaling apparatus Enunciator – it is the signaling system that activates the alarm Central station Proprietary system Local alarm Auxiliary alarm Audio detection device Vibration detection device Metallic foil or wire Laser beam alarm It is one of the most widely used physical security devices in the asset protection program of installation A lock is defined as mechanical, electrical, hydraulic or electronic devices. Designated to prevent entry to a building, room, container or hiding places Key-operated Mechanical lock It uses some sort of arrangement of internal physical barriers(wards tumblers) which prevent the lock from operating unless they are properly aligned . The key is the device used to align these internal barriers so that the lock may be operated. Padlock A portable and detachable lock having a sliding hasp which passes through a staple ring and is then made fasten or secure Combination lock Instead of using the key align the tumblers the combination mechanism uses numbers, letters or the other symbols as reference point which enables an operator to align them manually. Code-operator lock A type of lock that can open by pressing a series of number in proper sequence. Electrical Lock A type of lock that can be opened and closed remotely by electrical means. Card Operated Lock A type of lock operated by a coded card. Change key A specific key which operate the lock and has particularly combination of cuts which match the arrangement of the tumbler in the lock. Sub-master key A key that will open all the lock within a particularly area or grouping in a given facility. Grand master key A key that will open everything in a system two or more master key groups. Key control Once an effective key control has been installed, positively control of all keys must be gained and maintained. This can be accomplished only if it is establish in conjunction with the installation of new locking devices. Art. 304 (revised penal code) possession of picklocks or similar tools . Any person who shall without lawful cause have in possession of picklocks or similar tools especially to the commission of the crime robbery , shall be punishable by arrest to mayor in its minimum period. The same penalty shall be imposed upon any person who shall make such tool. If the offender is a locksmith, shall suffer the penalty of prison correctional in its medium and maximum period. Art.305 (RPC).false key The tool mentioned in the next proceeding articles genuine keys stolen to the owner Any key other than those intended by the owner for use in the lock forcibly opened by the offender . The final line defense at any facility is in the high security storage where papers , records, plans , or cashable instrument , precious metals or other especially valuable assets are protected . This security will be of a size and quantity, which the nature of the business dictates. In protecting property, it is essential to recognize that protective container are designed to secure against burglary or fire. Each type of equipment has a specialize function and it will depend on the owner of the facility which type has is going to use. 1. Safe A metallic container used for the safekeeping of documents or small items in an office or installation. Safe can be classified as either robbery or burglary resistance depending upon the use and need. Its weight must be at least 750lbs. and should be anchored to a building structure. Its body should at least one inch thick steel. 2. Vault Heavily constricted fire and burglar resistance container usually a part of the building structure used to keep and protect the cash, documents and negotiable instruments. Vaults are bigger than safe but smaller than a file room. The vault door should be made of steel at least 6 inches in thickness. The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness. The vault must be resistive up to 6 hours. 3. File room A cubicle in a building constructed a little lighter than a vault but of the bigger size to accommodate limited people to work on the record inside. The file room should at most 12 feet high. It must have a watertight door and at least fire proof for one hour. Badge must be tamper-resistant They should contain a clear and recent photograph of the bearer The photograph should be at least 1 inch square and should be updated every two or three years or when there is a significant change in appearance Should additionally contain vital statistics such as date of birth, height, weight, color of hair and eyes, gender and thumbprints Personal recognition Artificial recognition Single pass system The badge or pass coded authorization to enter specific areas is issued to an employee who keeps it in his possession until the authorization is terminates Pass exchange system An exchange takes place at the entrance of each controlled area. Upon leaving the personnel surrenders his badge or passes and retrieve back his basic identification Multiple pass system This provides an extra measure of security by requiring that an exchange take place at the entrance of each restricted area. The system should have complete record of all badges and identification card issued The supervisor required to check the badges from time to time to maintain accuracy and efficiency of the operation Passes and badges lost should immediately validated Visitor’s logbook Photograph Escort Visitor entrance Time travelled Includes all the security measures designed to prevent unsuitable individuals or persons of doubtful loyalty to the government from gaining access to classified matter or to any security facilities, and to prevent appointment, or retention as employees of such individuals. Personnel security generally embraces such security measures as personnel security investigation, security orientation and indoctrination and security education as will ensure the prevention of unsuitable individuals or persons of doubtful loyalty to the government, from gaining access to classified matter or being appointed, employed or retained as employees. Just any other technique, security must start from a given foundation or basic shall be referred to as the principles of security. Are normally disseminated by regulation or directive to ensure uniformity of purpose ,logical and similar methods of operation can appropriate and continuous placement of responsibility . Material that a government body claims is sensitive information that requires protection of confidentiality, integrity, or availability that required security clearance. Information Sensitivity-is a control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others. Security Clearance-a status granted to individuals allowing them to access to classified information or to restricted areas after completion of thorough background check. Restricted Area-a zone established by a sanctioning body to prohibit specific activities in a specific area. Background Check-the process of looking up and compiling criminal records, commercial records and financial records of an individual organization. E.g. Employment screening, Loyalty check National Local Barangay The term “Need to Know”, when used by government and other organizations, describes the restriction of data which is considered very sensitive. Under need-to-know restrictions, even if one has all the necessary official approvals to access certain information, one would not be given access to such information, or read into a clandestine operation, unless one has a specific need to know, that is, access to the information must be nessesary for the conduct of one’s official duties. No one is supposed to be given an access to the need to know even when it comes to the rank and position of an individual. Top Secret (YELLOW) is the highest form of classified information. Information is further compartmented so that specific access using a code word after top secret is a legal way to hide collective and important information. Such material would cause “exceptionally grave damage” to national security if made publicly available. Secret (RED)-it is desired that no document be released which refers to experiments with humans and might have adverse effect on public opinion or result in legal suits. Documents covering such work field should be classified ‘secret’. Secret material would cause “serious damage” to national security if it were publicly available. Confidential (BLUE)material would cause damage or prejudicial to national security if publicly available. Restricted material would cause “undesirable effects” if publicly available. Official material forms the generality of government business, public service delivery and commercial activity.