LEA 3: Industrial Security Concept Chapter 1

MarvellousGothicArt avatar
MarvellousGothicArt
·
·
Download

Start Quiz

Study Flashcards

40 Questions

According to Oliver O. Wainwright, how is security defined?

Protection of assets against espionage, sabotage, theft, and fraud

Industrial Security Management involves the skillful handling of the security and safety measures of industrial establishments.

True

What is the 'Private Security Agency Law' also known as?

R.A. 5487

What does Defense in Depth refer to?

Using multiple barriers to prevent unauthorized access

What are the two general types of physical security barriers mentioned in the text?

Natural barriers and Man-made barriers

_____ security refers to the protection of assets, guests, and personal effects in hotels and similar establishments.

Hotel

Match the type of security with its description:

Physical Security = Measures to prevent unauthorized access to equipment, facilities, materials, and documents. Personal Security = Protection of personnel from harm, kidnapping, and other acts. Document Security = Protection of documents and classified papers from unauthorized access and disclosure.

Which animals are commonly used as guards, aside from dogs? Goose is popular as an animal barrier in England.

goose

Match the following types of physical security barriers with their descriptions:

Natural Barriers = Include mountains, cliffs, canyons, ravines, seas, marshes, deserts Structural Barriers = Constructed by man and tend to delay intruders (e.g., walls, ceilings) Human Barriers = Include guards and workers who protect the area Energy Barriers = Consist of electrical and electronic devices to detect intrusions

Protective lighting is considered a cost-effective deterrent to crime.

True

According to the content, what is another term for 'Superior Responsibility'?

Command Responsibility

Define 'Compartmentalization' in the context of information security.

Compartmentalization is the limiting of access to information to persons or entities on a need-to-know basis to perform specific tasks.

Security prevails over efficiency, according to the content.

True

What type of alarm system notifies the police and other agencies when an alarm is triggered?

Central Station System

What are the three components of the CIA triad in security? Confidentiality – to maintain private info. ______ – to maintain the data or info. free from any modification. ______ – to maintain the info. available when it is needed.

Integrity, Availability

Vibration Detection Devices are used to detect temperature changes.

False

Match the following technologies with their purposes:

Biometrics = Identification and verification Antivirus = Specifically used for cyber security Closed-Circuit Television (CCTV) = For surveillance

A metallic foil or wire is used to secure all points of entry by creating an ________.

electrically charged circuit

Match the type of key with its description:

Change Key = Operates a specific lock with a unique combination Master Key = Capable of opening a series of locks Sub-Master Key = Opens all locks within a specific area or grouping Grand Master Key = Opens everything in a system with multiple master key groups

What is the purpose of Personnel Security?

To ensure hiring suitable employees and providing necessary security to them.

What is the purpose of positive vetting?

Process of inspecting or examination based on information given by the applicant

What are the major factors in the read report process?

Self-projection factor

Deception detection techniques rely on using various devices to detect deception.

True

Financial and Lifestyle Inquiry focuses on investigating gathered information related to __________ and mode of living.

income

Match the following investigation types with their descriptions:

Undercover Investigation = Employing agent with unknown identity Sabotage Investigation = Destruction of property to hinder operations Theft Investigation = Taking of personal property without consent for personal gain

What are two main uses of undercover assignments?

To get firsthand information about the subject of investigation and to supplement other investigative techniques.

What are the types of Undercover Assignments?

Work Assignment

What are the 5 Phases of Security Education?

Security Reminders

What is the definition of Pilferage?

The act of stealing small things or items of little value.

What is classified as 'Document'?

Any recorded information regardless of its physical form or characteristics.

Espionage involves deliberate destruction or damaging of property.

False

What is the purpose of a Security Survey?

To determine security vulnerability and current security status of a facility.

Declassify means adding a security classification to classified information.

False

Republic Act No. 5487 is also known as 'The Private Security Agency ____.'

Law

Match the following terms with their definitions:

License to Exercise Profession = Document recognizing a person qualified as private security or training personnel. License to Operate = Certificate authorizing an individual or company to establish a security agency. Private Security Agency = Organization providing security services. Espionage = Activity of spying to gather secret information.

What is the main function of competitive intelligence?

To alert senior management to marketplace changes

Define wiretapping.

Interception of communications over a wire without the consent of the participants.

_________ is the term that includes wiretapping and bugging.

Eavesdropping

Electronic eavesdropping requires physical entry into the communication circuit.

False

Which organization rates safes in the US?

Underwriters Laboratories (UL)

Study Notes

Introduction to Industrial Security Concept

  • Security is defined as the use of measures to safeguard personnel, equipment, facilities, materials, and documents from espionage, sabotage, theft, and fraud.
  • Security is important for everyone, including homeowners, parents, employees, online shoppers, private companies, and governments.
  • The security of any business establishment today is a complex process involving active and passive measures to establish effective defense against crimes.

Types of Security

  • Physical Security: The broadest branch of security, concerned with physical measures to prevent unauthorized access to equipment, facilities, materials, and documents.
  • Communication Security: Protecting communication systems from unauthorized access or delay.
  • Hotel Security: Protecting assets, guests, personal effects, and properties in hotels, inns, and similar establishments.
  • Bank Security: Protecting cash, assets, personnel, and operations of a bank.
  • Document Security: Protecting documents and classified papers from loss, access, damage, theft, or compromise.
  • Personal Security: Protecting personnel, especially ranking officials, from harm, kidnap, or other acts.
  • Crisis Security: Part of VIP security, involved in hostage and kidnapping situations.
  • Industrial Security: Applied to business groups engaged in industries like manufacturing, assembling, research, and development.
  • Operational Security: Protecting processes, formulas, patents, and industrial activities from espionage, infiltration, loss, or compromise.
  • Supermarket Security: Applied in response to the growth of bazaars, marts, super malls, and similar establishments.
  • School Security: Applied in response to violent crimes committed against students, school personnel, and school properties.
  • Personnel Security: Involving background checks and measures to protect employees from harmful acts or conditions.

3 Major Aspects of Security

  • Physical Security: Measures to prevent physical access or entry to an installation or area by unauthorized personnel.
  • Personnel Security: Checking the background of individuals and protecting company personnel from potential harmful acts or conditions.
  • Documentary/Information Security: Safeguarding company documents from unintentional harmful acts or unauthorized disclosure of information.

History of Security

  • International Setting:
    • Historical roots of private security can be traced back to ancient times.
    • Protection of life and personal property was initially up to individuals, then tribes and cities.
  • Philippine Setting:
    • Sovereign monarchs had servants who acted as watchmen or protectors.
    • Spanish colonial government introduced the Guardia Civil in the Philippines.
    • American colonial period saw the establishment of a national police force.
    • Indian nationals or Bombay pioneers served as watchmen for commercial establishments.

General Principles of Security

  • Command Responsibility: Cannot be delegated, but security tasks can be assigned.
  • Compartmentalization: Limiting access to information on a need-to-know basis.
  • Balance between Security and Efficiency: Security prevails over efficiency.
  • CIA Trial: Confidentiality, Integrity, and Availability of information.

Current Trend in Security

  • The police and private security are building partnerships to combat crime.
  • Private security personnel are subordinate to the PNP in matters of law enforcement and crime prevention.
  • The industry is evolving with advancements in technology, including biometrics, antivirus software, and CCTV.### Module 1: Protection of Life, Liberty, and Property
  • The defense of the state affects the people, and citizens may be required by law to render personal military or civil services.
  • The service of citizens is personal, and their life, liberty, freedom, and property can only be taken after the observance of due process of law.
  • Due process of law has two aspects: substantive and procedural.
  • Procedural due process involves hearing before condemnation, inquiry, and trial.
  • The Constitution protects not only ownership but also possession, enjoyment, use, and disposition of private property.
  • Private property shall not be taken for public use without just compensation.

Statutory Authority

  • The Revised Penal Code (Act No. 3815, as amended) applies to crimes against persons, personal liberty, and security.
  • The Private Security Agency Law (Republic Act 5487, as amended) governs the operation, administration, and activities of security agencies, and the qualification, duties, and licensing of security guards.

Hazards

  • Hazards are conditions that may cause damage to property, injury, or loss of life.
  • Security measures are implemented to prevent these hazards.

Module 3: Principles of Physical Security

  • Enemy agents must access: the ultimate goal of physical security is to prevent unauthorized access to information.
  • Surreptitious vs. non-surreptitious: surreptitious entry is a greater hazard because it is difficult to detect.
  • There is no impenetrable barrier: physical security attempts to build defense by using multiple barriers.
  • Each installation is different: security procedures must be tailored to the specific needs of each installation.
  • Defense in depth: multiple barriers are used to prevent unauthorized access.

Types of Barriers

  • Natural barriers: mountains, cliffs, canyons, seas, marshes, and desserts.
  • Man-made barriers: walls, ceilings, doors, and fences.
  • Human barriers: guards, watchmen, and private detectives.
  • Animal barriers: trained dogs and geese.
  • Energy barriers: electrical and electronic devices such as protected lighting, CCTV, and anti-intrusion devices.

Levels of Physical Security

  • Minimum security: simple locks, fences, or perimeter barriers.
  • Low-level security: upgrade of security measures, such as intrusion alarm systems.
  • Medium-level security: use of advance intrusion alarm systems, perimeter barriers, and unarmed guards.
  • High-level security: use of CCTV, perimeter alarm systems, high-security lighting, and highly trained armed guards.
  • Maximum security: application of highly sensitive alarm systems and on-site response forces.

Perimeter Barriers

  • A perimeter barrier is a medium or structure that defines the physical limits of an installation or area.
  • Inside perimeter: a line of protection adjacent to the protected area.
  • Outside perimeter: a line of protection surrounding the protected area.
  • Line of physical defense: multiple layers of protection, including perimeter barriers, walls, doors, and internal control measures.

Protective Cabinets

  • Safe: a metallic container used for safekeeping of documents or small items.
  • Vault: a heavily constructed fire and burglary resistance container.
  • File room: a cubicle in a building constructed for the safekeeping of records.

Perimeter Barrier Openings

  • Gates and doors: must be locked and frequently inspected.
  • Sidewalks and elevators: provide access to areas within the perimeter barrier.
  • Utilities openings: must be protected by bars, grills, or structural means.
  • Clear zones: an unobstructed area on both sides of the perimeter barrier.

Types of Perimeter Barriers

  • Fences: independent structures designed to provide physical and visual access.
  • Building walls: walls, floors, and roofs serve as barriers.
  • Bodies of water: rivers, lakes, and seas can be used as natural perimeter barriers.

Additional Protective Barriers

  • Top guard: an additional overhang or barbed wire placed on vertical perimeter fences.
  • Guard control stations: provided at main perimeter and entrance to secure areas.
  • Towers or guard towers: house-like structures above the perimeter barrier.

Module 4: Protective Lighting

  • Protective lighting provides a means of continuous illumination during hours of darkness.
  • Darkness is an ally of intruders.
  • Types of protective lighting:
    • Continuous lighting: stationary luminary.
    • Glare projection type: focuses intensity on the intruder.
    • Controlled lighting: precisely focused lighting.
    • Standby lighting: reserve or standby lighting.
    • Movable or portable lighting: manually operated floodlights.
    • Emergency lighting: used in times of power failure.

Types of Lighting Sources

  • Incandescent lamp: least expensive, provides instant illumination.
  • Mercury vapor lamp: more efficient, used in exterior lighting.
  • Metal halide: high luminous efficiency, better color rendition.
  • Fluorescent: good color rendition, high lamp efficiency, long life.
  • High-pressure sodium vapor lamp: high luminous efficiency, used in exterior lighting.

Types of Lighting Equipment

  • Floodlights: used to accommodate most outdoor security lighting needs.
  • Streetlights: reduces crime.
  • Searchlights: highly focused, used to pinpoint trouble spots.
  • Fresnel lights: wide beam units, used to extend illumination.

Module 5: Protective Alarms

  • Protective alarms assist in detecting, impeding, or deterring potential security threats.
  • Basic parts of an alarm system:
    • Sensor or trigger device.
    • Transmission line.
    • Annunciator/enunciator.
  • Types of alarm systems:
    • Central station system: central station is located outside the installation.
    • Proprietary system: owned and operated by the facility.
    • Auxiliary alarm: circuits are led into local police or fire department.
    • Local alarm by chance system: no predictable response.
    • Dial alarm system: dials a predestined number when the alarm is activated.

Types of Alarms

  • Vibration detection device: detects vibration caused by attempted forced entry.
  • Metallic foil or wire: detects movement or disturbance.
  • Bills traps: placed in cash drawers, activated when currency is removed.
  • Double squeeze buttons: pressure required on both sides to activate.
  • Laser beam alarm: detects disturbance of the beam.
  • Foot rail activator: activated by placing foot on the activation bar.
  • Photoelectric eye device: detects movement or disturbance.
  • Audio detection device: detects sound caused by attempted forced entry.

Module 6: Protective Locks and Keys

  • Locks: one of the most widely used physical security devices.
  • Types of locks:
    • Locks.
    • Keys.
    • Electronic locks.
    • Biometric locks.
  • Locksmithing: the practice of designing, installing, and repairing locks.### Locks and Keys
  • Padlock: a portable and detachable lock with a sliding hasp that passes through a staple ring or the like and is then made fast or secured.
  • Warded lock: offers very little security, used only for privacy, not for high security.
  • Disc tumbler lock: designed for the automobile industry, used in car doors, easy and cheap to be expanded to other areas, provides approximately 10 minutes of delay.
  • Level tumbler lock: difficult to define in terms of security, used in safe deposit boxes, and for all practical purposes, pick-proof.
  • Combination lock: difficult to defeat, cannot be picked, few experts can manipulate the device to discover the combination.
  • Card operated lock: electronically or magnetically operated, uses coded cards, frequently fitted with recording devices, which registers time of use and identity of the user.
  • Code-operated lock: high security locking device, no key is used, opens by pressing a series of numbered buttons in the proper sequence.

Key Control

  • Management of keys in a plant or business organization to prevent unauthorized individuals from accessing the keys.
  • Types of keys:
    • Change key: operates a specific lock, has a particular combination of cuts or battings that match the tumblers in the lock.
    • Sub-master key: opens all locks within a particular area or grouping in a facility.
    • Master key: capable of opening a series of locks.
    • Grand master key: opens everything in a system involving two or more master key groups.

Personnel Security

  • Purpose: ensure that a firm hires the best-suited employees, and to provide necessary security to them.
  • Key functions:
    • Screening device in hiring suitable employees.
    • Provides background investigation services.
    • Develops security awareness among employees.
    • Handles investigation of employees.

Personnel Security Investigation (PSI)

  • Process of inquiry into the character, reputation, discretion, integrity, morals, and loyalty of an individual to determine suitability for appointment or access to classified matter.
  • Importance: approximately 5% of employees lie in their declared information, and approximately 85% to 87% of employees are considered a real threat to the company.

Techniques of Personnel Security Investigation

  • Background investigation: serves as a verification of information.
  • Positive vetting: process of inspecting or examination, conducted under stress.
  • Profiling: predicts the subject's reaction in a future criminal situation.
  • Read report: a form of employing examination to test the attitude of the applicant.
  • Deception detection techniques: uses devices to detect deception during the stage.
  • Financial and lifestyle inquiry: focuses on the investigation of gathered information regarding income and mode of living.
  • Undercover investigation: employs an agent whose identity is unknown.
  • Exit interview: provides an opportunity for the departing employee to express their grievances.

Security Investigation

  • Planned and organized determination of facts concerning specific loss or damage of assets due to threats, hazards, or unsecured conditions.
  • Types of security investigations:
    • Background check/investigation: includes pre-employment, during employment, lifestyle, and reliability checks.
    • Lifestyle (financial) investigation: inquiry about the life existence of the subject, conducted to establish a guide for estimating or determining the sources and amount of income available.
    • Claims investigation: gathers information to present facts to the company's insurer.
    • Employee misconduct investigation: determines if the company's rules and regulations are violated.
    • Espionage investigation: gathers, transmits, or loses information respecting national defense.
    • Sabotage investigation: destroys property or obstructs public service to undermine a government, police, or military effort.
    • Theft investigation: taking of personal property of another without consent, with intent to gain.

Learn about the concept of security in industrial settings, including its importance and measures to prevent unauthorized access, espionage, and more.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Industrial Security Measures
8 questions

Industrial Security Measures

SelfRespectMaclaurin avatar
SelfRespectMaclaurin
Industrial Security Concepts Quiz
10 questions
Industrial Security Concepts Overview
10 questions
Use Quizgecko on...
Browser
Browser