Protective Security Barriers

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary purpose of maintaining 'clear zones' around a perimeter barrier?

  • To provide aesthetically pleasing landscaping.
  • To facilitate unobstructed observation and patrol movement. (correct)
  • To serve as a space for temporary storage of equipment.
  • To create a designated smoking area for security personnel.

In security terms, what does 'protection in depth' refer to when fencing or walling is impractical or expensive?

  • Burying the fencing deeper into the ground for added stability.
  • Using multiple layers of concrete in wall construction.
  • The conspicuous placement of warning signs. (correct)
  • Hiring additional security guards to patrol the area.

Which of the following best describes the function of glare projection in stationary luminary lighting?

  • To evenly illuminate the entire area, improving visibility for everyone.
  • To provide soft, ambient lighting that doesn't create harsh shadows.
  • To focus intense bright light on an intruder, hindering their vision while enhancing the observer's. (correct)
  • To highlight specific architectural features of a building.

What is the principle benefit of using 'standby lighting' in a security setup?

<p>It offers reserve or supplementary lighting, useful for selectively illuminating specific areas occasionally. (C)</p> Signup and view all the answers

Which type of lighting is best suited for extending illumination in long, horizontal strips along a perimeter barrier?

<p>Fresnel lights (C)</p> Signup and view all the answers

Within an alarm system, what role does the 'circuit or transmission line' serve?

<p>It is the communication channel that conveys information from sensors to the alarm signal. (B)</p> Signup and view all the answers

Which of the following describes a 'proprietary' protective alarm system?

<p>An alarm system with a duty operator located within the protected industrial firm who calls for assistance as needed. (D)</p> Signup and view all the answers

What is the key function of an 'audio detection device' in security?

<p>To detect sounds caused by attempted forced entry. (B)</p> Signup and view all the answers

For what type of security application are 'laser beam alarms' typically used?

<p>Long-range, high-precision security in military or banking environments. (D)</p> Signup and view all the answers

What is the primary purpose of a 'foot rail activator' in a bank alarm system?

<p>To allow tellers to discreetly activate an alarm with their foot. (A)</p> Signup and view all the answers

What distinguishes a 'manipulation-resistant combination lock' from a conventional combination lock?

<p>Its design prevents direct contact between the opening lever and the tumblers until the correct combination is set. (D)</p> Signup and view all the answers

What is the main characteristic of a 'warded lock'?

<p>It uses obstructions or wards to prevent opening unless the correct key with matching notches is inserted. (D)</p> Signup and view all the answers

What is the key differentiator between a master key and a grand master key?

<p>A grand master key can open every lock in a system, while a master key can only open a series of locks. (A)</p> Signup and view all the answers

What is the minimum recommended weight for a safe to ensure it provides adequate resistance against robbery and burglary?

<p>750 lbs (B)</p> Signup and view all the answers

During a personnel security investigation (PSI), what does the evaluation of 'discretion' assess?

<p>The individual's ability to act with prudence and sound judgement. (A)</p> Signup and view all the answers

Flashcards

Entry Stations

Provided at main entrances, manned by guards to secure areas outside doors.

Towers

House-like structures above the perimeter barrier to increase observation range.

Clear Zones

Unobstructed areas on both sides of a perimeter to prevent concealment.

Signs and Notices

Signs that indicate potential hazards or conditions requiring special attention.

Signup and view all the flashcards

Protective Lighting

Lighting that provides improved protection and acts as a psychological deterrent.

Signup and view all the flashcards

Stationary Luminary

Bright white light focused on an intruder, impairing their vision.

Signup and view all the flashcards

Standby Lighting

Lighting designed for reserve use or to supplement continuous systems.

Signup and view all the flashcards

Floodlights

Floodlights used to illuminate boundaries, fences, and buildings.

Signup and view all the flashcards

Searchlights

Highly focused lights designed to pinpoint potential trouble spots.

Signup and view all the flashcards

Sensors or Trigger Device

Detects abnormal conditions and provides a signal indicating the abnormality.

Signup and view all the flashcards

Motion Sensors

Detect movement within a designated area.

Signup and view all the flashcards

Magnetic Contact Sensors

Detects the opening or closing of doors/windows.

Signup and view all the flashcards

Annunciator/Enunciator

A visual or audible signaling device in an alarm system.

Signup and view all the flashcards

Laser Beam Alarm

A laser emitter floods a wall or fencing so when disturbed, it activates the alarm .

Signup and view all the flashcards

Bill Traps

Currency Activation devices placed in teller drawers, connected to the alarm system.

Signup and view all the flashcards

Study Notes

Additional Protective Barriers

  • Entry stations are located at main perimeter entrances to secure areas and manned by guards full-time.
  • Gates and doors should be locked and inspected frequently when not in use or controlled by guards.
  • Telephone entry systems are utilized in apartment buildings, which include a panel, handset, and touchpad.
  • Towers are elevated structures above the perimeter barrier to increase observation range, during both day and night.
  • Clear zones are unobstructed areas maintained on both sides of the perimeter, to improve observation and patrol movement, and prevent concealment or unauthorized entry.
  • A minimum of 50 feet or more (inside) of clear zone is required between the perimeter barrier and structure within the protected areas
  • A minimum of 20 feet or more (outside) of clear zone between the perimeter barrier and exterior structure is required
  • Utility openings of 10 inches or more in diameter need to be secured to prevent unauthorized access.
  • In large areas where fencing is impractical, warning signs indicating potential hazards or dangers should be conspicuously placed for protection in depth.

Protective Lighting

  • Protective lighting can improve protection for people and facilities.
  • Protective lighting is a cost-effective method that deters crime by creating a psychological barrier.

Types of Lighting

  • Stationary Luminary: Consists of fixed luminaries, with glare projection focusing bright white light on potential intruders, while controlled lighting focuses on specific objects instead of the background.
  • Standby lighting: Used as reserve or to supplement continuous systems, in order to selectively light a particular area on an occasional basis.
  • Movable or portable lighting: Manually operated and located in selected or special locations for short periods.

Security Lighting Equipment

  • Floodlights: Accommodate most outdoor security lighting needs by illuminating boundaries, fences, buildings, and vital areas.
  • Searchlights: Highly focused incandescent lamps designed to pinpoint potential trouble spots.
  • Fresnel lights: Wide beam units that extend illumination in long, horizontal strips to protect the perimeter, with a narrow beam approximately 180 degrees horizontally and 15-30 degrees vertically.
  • Emergency lighting: Standby lighting utilized during electrical failures, whether from local equipment or commercial power issues.

Protective Alarms

  • Protective Alarms: Provides an aural or visual signal to security personnel when intruders actuate certain devices in a protected area.

Alarm System - Three Basic Parts

  • Sensors or trigger devices are able to sense an abnormal condition within the system and provide a signal indicating the presence or nature of the abnormality
  • Circuit or Transmission Line: Serves as the communication channel, conveying information from all sensors via wire or radio waves.
  • Annunciator/Enunciator: Acts as a visual or audible signaling device, with alarms that may be silent or audible, such as a bell, buzzer, phone ringing, or flashing light.

Types of Sensors and Trigger Devices

  • Motion Sensors
  • Magnetic Contact Sensors - Detect the opening or closing of doors/windows.
  • Glass Break Sensors
  • Vibration Sensors - Identify unusual shaking or impact on a surface.
  • Infrared Sensors - Detect heat signatures.
  • Smoke/Heat Sensors.
  • Gas/Carbon Monoxide Sensors
  • Pressure Sensors - Identify changes in weight or pressure.
  • Water/Flood Sensors

Protective Alarm Systems

  • Central Station System: The control station located outside the plant monitors alarms and notifies police and public safety agencies.
  • Proprietary system: A centralized monitor within the industrial firm is operated by a duty operator who calls for necessary assistance such as firefighters, police, ambulance, or bomb disposal.
  • Local Alarm: System rings a visual or audible alarm near the protected object when an intruder attempts forced entry.
  • Auxiliary alarm company: Company-owned alarm systems that maintain equipment and lines, with a unit in the nearest police station for direct calls when needed.

Kinds of Alarms

  • Audio Detection Device: Senses sounds from attempted forced entry using a supersonic microphone speaker in walls, ceilings, and floors.
  • Honeywell 5853 Wireless Glass Break Detector: Audio sensor detects sound frequency of breaking glass, securing windows and glass doors.
  • Vibration Detection Device: Detects vibration from attempted force entry using a vibration-sensitive sensor attached to walls, ceilings, or floors.
  • Honeywell V-Plex Vibration Sensor (Model 4939SN): Detects forced entry attempts through walls, ceilings, or safes, and is suitable for vaults, safes, and ATMs.
  • Metallic foil or wire: Detects movement of the foil or wire utilizing electrically charged strips on doors, windows, or glass.
  • GE Security 1076 Series Recessed Door/Window Alarm Contacts: Uses wired strips or foil for break-in detection securing glass windows and doors.
  • Laser Beam Alarm: A laser emitter floods a wall or fencing with a beam. When disturbed, an alarm is activated.
  • Optex SL-200QDM Laser Beam Sensor: Has long-range dual-beam detection (up to 200m), weatherproof, and ideal for outdoor use.
  • Photoelectric or Electric Eye Device: Emits an invisible/visible beam that activates the alarm when disturbed or broken.
  • Laser Beam Alarms:Used for long-range, high-precision security (military, banks, restricted areas).
  • Photoelectric (Electric Eye) Devices: Used for short to medium-range safety and automation (elevators, doors, perimeters).

Types of Bank Alarms

  • Foot rail Activator - Activates alarm when tellers place the front of their foot to foot rail.
  • Knee or Thigh Buttons - Installed inside teller stations to be activated by knee or thigh pressure.
  • Foot Bot ton - Permits alarm activation while keeping both hands visible.
  • Double Squeeze Button - Reduces accidental alarms by requiring pressure on both sides.
  • Bill traps - Also known as Currency Activation devices, Usually placed in the tellers top cash drawer and connected to the alarm system using a wire connector.

Protective Locks

  • Locks are mechanical or electronic devices operated by a key, that prevent entry into a building, room, or container.

Types of Common Locking Devices

  • Key Locks: Basic cylinder locks that provide adequate security used for corporate and industrial roles.
    • Key: Is a device used to align internal barriers so that the lock may be operated.
  • Conventional Combination Locks: Locking device using sequence of symbols/numbers.
  • Manipulation-Resistant Combination Locks: Design which prevents the opening lever from contacting tumblers until the correct combination is set.
  • Code operated lock: Opens by pressing a numbered button series in the correct order.
  • Electrical lock: Can be opened and closed remotely by electrical means.
  • Card - operated lock: Operated by coded card.

General Groups of Locks

  • Warded Lock: Uses obstructions or wards to prevent opening unless the correct key is inserted
  • Pin Tumbler Lock: Lock mechanism using pins of varying lengths to prevent lock from opening without the correct key.
  • Lever Tumbler Lock: Lock used in a safe deposit box, desks, lockers, and cabinets are generally less secure than pin tumbler lock
  • Disc Tumbler Lock: Lock composed of slotted rotating detainer discs in which a key rotates the discs to align slots and allow the sidebar to drop, opening the lock.

Types of Keys

  • Change Keys: A specific key operating the lock with a particular combination of cuts matching tumbler arrangements.
  • Sub-master Keys: A key that opens all locks within a specific area or grouping in a given facility.
  • Master Key: A special key capable of opening a series of locks.It is capable of opening less number of locks than grand master key.
  • Grand Master key: Opens all locks in a system involving two or more master key groups.
  • PETERMAN: Term for England's lock pickers, safecrackers, and penetrators of restricted areas or rooms.
  • FALSE KEY: Genuine key stolen from the owner

Protective Cabinets

  • High-security storage is the final defense in any facility, for safeguarding papers, records, instruments, metals, etc.

Types of Protective Cabinets

  • SAFE: A metallic container for safekeeping documents or small items, classified by robbery and burglary resistance.
    • SAFEs weigh at least 750 lbs, are anchored, have 1-inch thick steel bodies, 1 ½ inch thick steel doors, and provide 30-120 minutes fire resistance.
  • VAULT: A heavily constructed fire and burglar resistance container in a building, used to protect cash, documents, and negotiable instruments.
    • Vaults can have steel doors at least 6 inches thick, reinforced concrete walls/ceiling/floor at least 12 inches thick, 4-6 hours resistive, and elevated floors by 4 inches.
  • FILE ROOM: Cubicle in a building, lighter than a vault but bigger in size, that accommodates limited people to work on records inside.
    • File rooms are at most 12 feet high, has watertight doors, are fire proof for one hour, and have interior cubage of no more than 10,000 cubic feet.

Personnel Security Investigation

  • Personnel Security: The procedure, inquiries, and criteria used to determine the work suitability of an applicant or employee.
  • Personnel Security Investigation: Inquiry into a person's character, reputation, discretion, integrity, morals, and loyalty.

Types of Personnel Security Investigation

  • National Agency Check (NAC): Investigation based on written information from the individual and national agency file checks such as PNP, ISAFP, NBI, CSC, and Bureau of Immigration.
  • Local Agency Check (LAC): Consists of investigation plus written inquiries sent to local government agencies, formal employees, references, and schools.

Background Investigation (BI)

  • Background Investigation: A thorough and complete investigation of all or some of the circumstances or aspects of a person's life.

Kinds of Background Investigation

  • Complete background Investigation (CBI): A type of BI which is more comprehensive, particularly all he circumstances of his personal life.
  • Partial Background Investigation (PBI): Investigation of the background of the individual but limited only to some circumstances of his personal life.

Factors for Background Investigation

  • Loyalty
  • Integrity
  • Discretion
  • Moral
  • Character
  • Reputation

Motives for Disloyalty

  • Revenge
  • Material Gain
  • Personal prestige
  • Friendship
  • Ideological Beliefs

Document Security

  • Document and Information Security: Protects documents and information from loss and unauthorized access, while establishing policies and procedures for classifying and securing official matters.

Security of Classified Matters

  • Classify - the act of assigning to information or material one of the four security classification categories.
  • Top Secret: Unauthorized disclosure causes exceptionally grave damage to the nation.
  • Secret: Unauthorized disclosure endangers national security or causes serious injury.
  • Confidential: Unauthorized disclosure is prejudicial or causes embarrassment/unwarranted injury.
  • Restricted: Information requires special protection beyond Confidential, Secret, or Top Secret.
  • Declassify: Removal of security classification.
  • Reclassify/Regrading: Changing the assigned classification.
  • Upgrading: Assigning a higher classification.
  • Security Clearance: Administrative determination to allow access to classified material of a specific category.
  • Dissemination: Restriction of classified matter to properly cleared persons with required knowledge.
  • Compartmentation: Granting access to classified matter only to properly cleared persons requiring the information for official duties.
  • Need to Know: Limiting dissemination of classified matters strictly to those with official duties requiring knowledge.

Types of Documents

  • Class I - Vital Document: Irreplaceable documents that cannot be reproduced with the same value.
  • Class II - Important Document: Causes considerable expense/labor or delay upon reproduction.
  • Class III - Useful Document: Loss causes inconvenience but is readily replaceable.
  • Class IV - Non essential Document: Includes daily files or routine nature, the loss of which will not affect the organization.

Destruction of Documents

  • Methods to destroy documents include:
    • Burning
    • Shredding

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Physical Security Principles Quiz
40 questions

Physical Security Principles Quiz

WellPositionedCarolingianArt avatar
WellPositionedCarolingianArt
6
19 questions

6

DextrousDysprosium8195 avatar
DextrousDysprosium8195
Use Quizgecko on...
Browser
Browser