Podcast
Questions and Answers
According to Oliver O. Wainwright, how is security defined?
According to Oliver O. Wainwright, how is security defined?
Industrial Security Management involves the skillful handling of the security and safety measures of industrial establishments.
Industrial Security Management involves the skillful handling of the security and safety measures of industrial establishments.
True
What is the 'Private Security Agency Law' also known as?
What is the 'Private Security Agency Law' also known as?
R.A. 5487
What does Defense in Depth refer to?
What does Defense in Depth refer to?
Signup and view all the answers
What are the two general types of physical security barriers mentioned in the text?
What are the two general types of physical security barriers mentioned in the text?
Signup and view all the answers
_____ security refers to the protection of assets, guests, and personal effects in hotels and similar establishments.
_____ security refers to the protection of assets, guests, and personal effects in hotels and similar establishments.
Signup and view all the answers
Match the type of security with its description:
Match the type of security with its description:
Signup and view all the answers
Which animals are commonly used as guards, aside from dogs? Goose is popular as an animal barrier in England.
Which animals are commonly used as guards, aside from dogs? Goose is popular as an animal barrier in England.
Signup and view all the answers
Match the following types of physical security barriers with their descriptions:
Match the following types of physical security barriers with their descriptions:
Signup and view all the answers
Protective lighting is considered a cost-effective deterrent to crime.
Protective lighting is considered a cost-effective deterrent to crime.
Signup and view all the answers
According to the content, what is another term for 'Superior Responsibility'?
According to the content, what is another term for 'Superior Responsibility'?
Signup and view all the answers
Define 'Compartmentalization' in the context of information security.
Define 'Compartmentalization' in the context of information security.
Signup and view all the answers
Security prevails over efficiency, according to the content.
Security prevails over efficiency, according to the content.
Signup and view all the answers
What type of alarm system notifies the police and other agencies when an alarm is triggered?
What type of alarm system notifies the police and other agencies when an alarm is triggered?
Signup and view all the answers
What are the three components of the CIA triad in security? Confidentiality – to maintain private info. ______ – to maintain the data or info. free from any modification. ______ – to maintain the info. available when it is needed.
What are the three components of the CIA triad in security? Confidentiality – to maintain private info. ______ – to maintain the data or info. free from any modification. ______ – to maintain the info. available when it is needed.
Signup and view all the answers
Vibration Detection Devices are used to detect temperature changes.
Vibration Detection Devices are used to detect temperature changes.
Signup and view all the answers
Match the following technologies with their purposes:
Match the following technologies with their purposes:
Signup and view all the answers
A metallic foil or wire is used to secure all points of entry by creating an ________.
A metallic foil or wire is used to secure all points of entry by creating an ________.
Signup and view all the answers
Match the type of key with its description:
Match the type of key with its description:
Signup and view all the answers
What is the purpose of Personnel Security?
What is the purpose of Personnel Security?
Signup and view all the answers
What is the purpose of positive vetting?
What is the purpose of positive vetting?
Signup and view all the answers
What are the major factors in the read report process?
What are the major factors in the read report process?
Signup and view all the answers
Deception detection techniques rely on using various devices to detect deception.
Deception detection techniques rely on using various devices to detect deception.
Signup and view all the answers
Financial and Lifestyle Inquiry focuses on investigating gathered information related to __________ and mode of living.
Financial and Lifestyle Inquiry focuses on investigating gathered information related to __________ and mode of living.
Signup and view all the answers
Match the following investigation types with their descriptions:
Match the following investigation types with their descriptions:
Signup and view all the answers
What are two main uses of undercover assignments?
What are two main uses of undercover assignments?
Signup and view all the answers
What are the types of Undercover Assignments?
What are the types of Undercover Assignments?
Signup and view all the answers
What are the 5 Phases of Security Education?
What are the 5 Phases of Security Education?
Signup and view all the answers
What is the definition of Pilferage?
What is the definition of Pilferage?
Signup and view all the answers
What is classified as 'Document'?
What is classified as 'Document'?
Signup and view all the answers
Espionage involves deliberate destruction or damaging of property.
Espionage involves deliberate destruction or damaging of property.
Signup and view all the answers
What is the purpose of a Security Survey?
What is the purpose of a Security Survey?
Signup and view all the answers
Declassify means adding a security classification to classified information.
Declassify means adding a security classification to classified information.
Signup and view all the answers
Republic Act No. 5487 is also known as 'The Private Security Agency ____.'
Republic Act No. 5487 is also known as 'The Private Security Agency ____.'
Signup and view all the answers
Match the following terms with their definitions:
Match the following terms with their definitions:
Signup and view all the answers
What is the main function of competitive intelligence?
What is the main function of competitive intelligence?
Signup and view all the answers
Define wiretapping.
Define wiretapping.
Signup and view all the answers
_________ is the term that includes wiretapping and bugging.
_________ is the term that includes wiretapping and bugging.
Signup and view all the answers
Electronic eavesdropping requires physical entry into the communication circuit.
Electronic eavesdropping requires physical entry into the communication circuit.
Signup and view all the answers
Which organization rates safes in the US?
Which organization rates safes in the US?
Signup and view all the answers
Study Notes
Introduction to Industrial Security Concept
- Security is defined as the use of measures to safeguard personnel, equipment, facilities, materials, and documents from espionage, sabotage, theft, and fraud.
- Security is important for everyone, including homeowners, parents, employees, online shoppers, private companies, and governments.
- The security of any business establishment today is a complex process involving active and passive measures to establish effective defense against crimes.
Types of Security
- Physical Security: The broadest branch of security, concerned with physical measures to prevent unauthorized access to equipment, facilities, materials, and documents.
- Communication Security: Protecting communication systems from unauthorized access or delay.
- Hotel Security: Protecting assets, guests, personal effects, and properties in hotels, inns, and similar establishments.
- Bank Security: Protecting cash, assets, personnel, and operations of a bank.
- Document Security: Protecting documents and classified papers from loss, access, damage, theft, or compromise.
- Personal Security: Protecting personnel, especially ranking officials, from harm, kidnap, or other acts.
- Crisis Security: Part of VIP security, involved in hostage and kidnapping situations.
- Industrial Security: Applied to business groups engaged in industries like manufacturing, assembling, research, and development.
- Operational Security: Protecting processes, formulas, patents, and industrial activities from espionage, infiltration, loss, or compromise.
- Supermarket Security: Applied in response to the growth of bazaars, marts, super malls, and similar establishments.
- School Security: Applied in response to violent crimes committed against students, school personnel, and school properties.
- Personnel Security: Involving background checks and measures to protect employees from harmful acts or conditions.
3 Major Aspects of Security
- Physical Security: Measures to prevent physical access or entry to an installation or area by unauthorized personnel.
- Personnel Security: Checking the background of individuals and protecting company personnel from potential harmful acts or conditions.
- Documentary/Information Security: Safeguarding company documents from unintentional harmful acts or unauthorized disclosure of information.
History of Security
-
International Setting:
- Historical roots of private security can be traced back to ancient times.
- Protection of life and personal property was initially up to individuals, then tribes and cities.
-
Philippine Setting:
- Sovereign monarchs had servants who acted as watchmen or protectors.
- Spanish colonial government introduced the Guardia Civil in the Philippines.
- American colonial period saw the establishment of a national police force.
- Indian nationals or Bombay pioneers served as watchmen for commercial establishments.
General Principles of Security
- Command Responsibility: Cannot be delegated, but security tasks can be assigned.
- Compartmentalization: Limiting access to information on a need-to-know basis.
- Balance between Security and Efficiency: Security prevails over efficiency.
- CIA Trial: Confidentiality, Integrity, and Availability of information.
Current Trend in Security
- The police and private security are building partnerships to combat crime.
- Private security personnel are subordinate to the PNP in matters of law enforcement and crime prevention.
- The industry is evolving with advancements in technology, including biometrics, antivirus software, and CCTV.### Module 1: Protection of Life, Liberty, and Property
- The defense of the state affects the people, and citizens may be required by law to render personal military or civil services.
- The service of citizens is personal, and their life, liberty, freedom, and property can only be taken after the observance of due process of law.
- Due process of law has two aspects: substantive and procedural.
- Procedural due process involves hearing before condemnation, inquiry, and trial.
- The Constitution protects not only ownership but also possession, enjoyment, use, and disposition of private property.
- Private property shall not be taken for public use without just compensation.
Statutory Authority
- The Revised Penal Code (Act No. 3815, as amended) applies to crimes against persons, personal liberty, and security.
- The Private Security Agency Law (Republic Act 5487, as amended) governs the operation, administration, and activities of security agencies, and the qualification, duties, and licensing of security guards.
Hazards
- Hazards are conditions that may cause damage to property, injury, or loss of life.
- Security measures are implemented to prevent these hazards.
Module 3: Principles of Physical Security
- Enemy agents must access: the ultimate goal of physical security is to prevent unauthorized access to information.
- Surreptitious vs. non-surreptitious: surreptitious entry is a greater hazard because it is difficult to detect.
- There is no impenetrable barrier: physical security attempts to build defense by using multiple barriers.
- Each installation is different: security procedures must be tailored to the specific needs of each installation.
- Defense in depth: multiple barriers are used to prevent unauthorized access.
Types of Barriers
- Natural barriers: mountains, cliffs, canyons, seas, marshes, and desserts.
- Man-made barriers: walls, ceilings, doors, and fences.
- Human barriers: guards, watchmen, and private detectives.
- Animal barriers: trained dogs and geese.
- Energy barriers: electrical and electronic devices such as protected lighting, CCTV, and anti-intrusion devices.
Levels of Physical Security
- Minimum security: simple locks, fences, or perimeter barriers.
- Low-level security: upgrade of security measures, such as intrusion alarm systems.
- Medium-level security: use of advance intrusion alarm systems, perimeter barriers, and unarmed guards.
- High-level security: use of CCTV, perimeter alarm systems, high-security lighting, and highly trained armed guards.
- Maximum security: application of highly sensitive alarm systems and on-site response forces.
Perimeter Barriers
- A perimeter barrier is a medium or structure that defines the physical limits of an installation or area.
- Inside perimeter: a line of protection adjacent to the protected area.
- Outside perimeter: a line of protection surrounding the protected area.
- Line of physical defense: multiple layers of protection, including perimeter barriers, walls, doors, and internal control measures.
Protective Cabinets
- Safe: a metallic container used for safekeeping of documents or small items.
- Vault: a heavily constructed fire and burglary resistance container.
- File room: a cubicle in a building constructed for the safekeeping of records.
Perimeter Barrier Openings
- Gates and doors: must be locked and frequently inspected.
- Sidewalks and elevators: provide access to areas within the perimeter barrier.
- Utilities openings: must be protected by bars, grills, or structural means.
- Clear zones: an unobstructed area on both sides of the perimeter barrier.
Types of Perimeter Barriers
- Fences: independent structures designed to provide physical and visual access.
- Building walls: walls, floors, and roofs serve as barriers.
- Bodies of water: rivers, lakes, and seas can be used as natural perimeter barriers.
Additional Protective Barriers
- Top guard: an additional overhang or barbed wire placed on vertical perimeter fences.
- Guard control stations: provided at main perimeter and entrance to secure areas.
- Towers or guard towers: house-like structures above the perimeter barrier.
Module 4: Protective Lighting
- Protective lighting provides a means of continuous illumination during hours of darkness.
- Darkness is an ally of intruders.
- Types of protective lighting:
- Continuous lighting: stationary luminary.
- Glare projection type: focuses intensity on the intruder.
- Controlled lighting: precisely focused lighting.
- Standby lighting: reserve or standby lighting.
- Movable or portable lighting: manually operated floodlights.
- Emergency lighting: used in times of power failure.
Types of Lighting Sources
- Incandescent lamp: least expensive, provides instant illumination.
- Mercury vapor lamp: more efficient, used in exterior lighting.
- Metal halide: high luminous efficiency, better color rendition.
- Fluorescent: good color rendition, high lamp efficiency, long life.
- High-pressure sodium vapor lamp: high luminous efficiency, used in exterior lighting.
Types of Lighting Equipment
- Floodlights: used to accommodate most outdoor security lighting needs.
- Streetlights: reduces crime.
- Searchlights: highly focused, used to pinpoint trouble spots.
- Fresnel lights: wide beam units, used to extend illumination.
Module 5: Protective Alarms
- Protective alarms assist in detecting, impeding, or deterring potential security threats.
- Basic parts of an alarm system:
- Sensor or trigger device.
- Transmission line.
- Annunciator/enunciator.
- Types of alarm systems:
- Central station system: central station is located outside the installation.
- Proprietary system: owned and operated by the facility.
- Auxiliary alarm: circuits are led into local police or fire department.
- Local alarm by chance system: no predictable response.
- Dial alarm system: dials a predestined number when the alarm is activated.
Types of Alarms
- Vibration detection device: detects vibration caused by attempted forced entry.
- Metallic foil or wire: detects movement or disturbance.
- Bills traps: placed in cash drawers, activated when currency is removed.
- Double squeeze buttons: pressure required on both sides to activate.
- Laser beam alarm: detects disturbance of the beam.
- Foot rail activator: activated by placing foot on the activation bar.
- Photoelectric eye device: detects movement or disturbance.
- Audio detection device: detects sound caused by attempted forced entry.
Module 6: Protective Locks and Keys
- Locks: one of the most widely used physical security devices.
- Types of locks:
- Locks.
- Keys.
- Electronic locks.
- Biometric locks.
- Locksmithing: the practice of designing, installing, and repairing locks.### Locks and Keys
- Padlock: a portable and detachable lock with a sliding hasp that passes through a staple ring or the like and is then made fast or secured.
- Warded lock: offers very little security, used only for privacy, not for high security.
- Disc tumbler lock: designed for the automobile industry, used in car doors, easy and cheap to be expanded to other areas, provides approximately 10 minutes of delay.
- Level tumbler lock: difficult to define in terms of security, used in safe deposit boxes, and for all practical purposes, pick-proof.
- Combination lock: difficult to defeat, cannot be picked, few experts can manipulate the device to discover the combination.
- Card operated lock: electronically or magnetically operated, uses coded cards, frequently fitted with recording devices, which registers time of use and identity of the user.
- Code-operated lock: high security locking device, no key is used, opens by pressing a series of numbered buttons in the proper sequence.
Key Control
- Management of keys in a plant or business organization to prevent unauthorized individuals from accessing the keys.
- Types of keys:
- Change key: operates a specific lock, has a particular combination of cuts or battings that match the tumblers in the lock.
- Sub-master key: opens all locks within a particular area or grouping in a facility.
- Master key: capable of opening a series of locks.
- Grand master key: opens everything in a system involving two or more master key groups.
Personnel Security
- Purpose: ensure that a firm hires the best-suited employees, and to provide necessary security to them.
- Key functions:
- Screening device in hiring suitable employees.
- Provides background investigation services.
- Develops security awareness among employees.
- Handles investigation of employees.
Personnel Security Investigation (PSI)
- Process of inquiry into the character, reputation, discretion, integrity, morals, and loyalty of an individual to determine suitability for appointment or access to classified matter.
- Importance: approximately 5% of employees lie in their declared information, and approximately 85% to 87% of employees are considered a real threat to the company.
Techniques of Personnel Security Investigation
- Background investigation: serves as a verification of information.
- Positive vetting: process of inspecting or examination, conducted under stress.
- Profiling: predicts the subject's reaction in a future criminal situation.
- Read report: a form of employing examination to test the attitude of the applicant.
- Deception detection techniques: uses devices to detect deception during the stage.
- Financial and lifestyle inquiry: focuses on the investigation of gathered information regarding income and mode of living.
- Undercover investigation: employs an agent whose identity is unknown.
- Exit interview: provides an opportunity for the departing employee to express their grievances.
Security Investigation
- Planned and organized determination of facts concerning specific loss or damage of assets due to threats, hazards, or unsecured conditions.
- Types of security investigations:
- Background check/investigation: includes pre-employment, during employment, lifestyle, and reliability checks.
- Lifestyle (financial) investigation: inquiry about the life existence of the subject, conducted to establish a guide for estimating or determining the sources and amount of income available.
- Claims investigation: gathers information to present facts to the company's insurer.
- Employee misconduct investigation: determines if the company's rules and regulations are violated.
- Espionage investigation: gathers, transmits, or loses information respecting national defense.
- Sabotage investigation: destroys property or obstructs public service to undermine a government, police, or military effort.
- Theft investigation: taking of personal property of another without consent, with intent to gain.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Learn about the concept of security in industrial settings, including its importance and measures to prevent unauthorized access, espionage, and more.