Project Industrial

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

A.

Meaning of industrial security


A type of security applied to business groups engaged in industries like
manufacturing, ascending research and development, processing warehousing
and even agriculture.

B. Reflection of industrial security management


Industrial security management this includes the security of business,
enterprises which include the protection to prevent and safeguarding of
personnel, processes, properties industries and operations.

C.

Importance of security
The importance of security is safety from harm, that has different dimensions
psychology, public safety, defense and military matters, and information matters.
It includes semantic and philosophical sense, implies a stable, relatively
predictable environment in which an individual or group may pursue its ends
without disruption or harm.

D.

Major areas of security

Physical security- Example human guards, perimeter fence/barrier and


security devices.
Personal security
Ex - Procedure
- Inquiry
- Criteria
Document and information security
Ex - Policy
- Regulation
- Doctrine
- Practice

E. Types of security
1. Industrial security a type of security applied to business groups engaged
in industries like manufacturing, assembling research and development,
processing warehousing and even agriculture.
2. Hotel security a type of security applied to hotels where its properties
are protected from pilferage, loss, damage and the function in the hotel

3.
4.

5.
6.

restaurants are not disturbed and troubled by outsiders or the guest


themselves.
Bank hotel this type of security concern with bank operations.
VIP security a type of security applied for the protection of top-ranking
officials of the government or private entity, visiting persons of illustrious
standing and foreign dignities.
School security a type of security that is concern with the protection of
students, faculty members, and school properties.
Supermarket or mall security a type of security which is concern with the
protection of the stores, warehouses, storage, its immediate premises and
properties as well as the supermarket personnel and customers.

E. Barriers Defined
Refers to any physical structure whether natural or man made capable or
restricting, deterring, delaying or preventing illegal and unauthorized access to an
installation.
1.1 Purpose of barrier
The purpose of protective barriers in safeguarding the areas , building, and the
proper utilization of lighting at night have contributed to modern mans attempt to
discourage introducer, pilfer and other entrants devious intent.
1.2 Kinds of barriers

Natural barrier such as rivers, cliffs, and ravines, etc. which delay or
make more difficult the entry of the intruder.
Structural barrier these are features constructed by man regardless of
their original intent that tends to delay the intruder.
Human barrier persons being used in providing a guarding system by
the nature of their employment and location, fulfill security functions.
Animal barrier animals are used in partially providing a guarding system.
Energy barrier it is employment of mechanical, electrical, electronic
energy imposes a deterrent to entry by the potential intruder or to provide
warning to guard personnel.

1.3 Classification of barriers

A. Inside perimeter a line adjacent to protected area, and passing through


points of possible entry into the area, such as doors, windows, skylights,
tunnel or other points of access.
B. Outside perimeter- a line of protection surroundings but some what removed
from a protected area, such as fence.
1.4 Three lines of physical defense

First line of defense perimeter fences/barriers.


Second line of defense doors, floors, windows, walls, roofs and grills
and other entries to the buildings.
Third line of defense storage system like steel cabinets, safes, vaults
and interior files.

G. Perimeter barriers
Types of perimeter barrier

Wire fences
Walls
Bodies of water

1.1 Types of fence

Solid fence constructed in such away that visual access through the
fence is denied.
Full-view fence it is constructed in such way that visual access is
permitted through the fence.

1.2 Types of full -view fence

Chain link fence


Barbed wire fence
Concertina wire fence

1.3 The perimeter barrier opening

Gates and doors When not in use and controlled by guards, gates
and doors in the perimeter should be locked and frequently inspected
by guards. Lock should be changed from time to time and should be
covered under protective locks and key control.
Side-walk elevators These provide access to areas within the
perimeter barrier and should be locked and guarded.
Utilities opening sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional
areas of 96 square inches or more should be protected by bars, grills,
water filled traps or other structural means providing equivalent
protection to that portion of the perimeter barriers.
Clear zones an obstructed area or a clear zone should be
maintained on the sides of the perimeter barriers.

1.4 Types of protective lighting


1. Continuous lighting the most familiar type of outdoor security
lighting, this is designed to provide two specific results: it consists of
series of luminaries at range to flood a given area continuously during
the hours of darkness.
Glare protection type
Controlled lighting
2. Standby lighting it is designed for reserve or standby use or to
supplement continuous systems.
3. Movable or portable lighting this system is manually operated and is
usually made up of movable search or floodlights that can be located
in selected or special locations which will require lighting only for short
period of time.
4. Emergency this system is used in times of power failure or other
emergencies when other system are inoperative.
1.5 General types of lighting source
1. Incandescent lamp it is the least expensive in terms of energy
consumed and has the advantage of providing instant illumination
when the switch is on.
2. Mercury vapor lamp it is considered more efficient that if
incandescent and used widespread in exterior lighting. This emits a
purplish-white color, caused by an electric current passing through a
tube of conducting and luminous gas.

3. Metal halide it has similar physical appearance to mercury vapor but


provides a light source of higher luminous efficiency and better color
rendition.
4. Fluorescent this provides good color rendition, high lamp efficiency
as well as long life. However, it cannot project light over long distance
and thus are not desirable as flood type lights.
5. High pressure sodium vapor this has gained acceptance for exterior
lighting of parking areas, roadways, buildings and commercial in
interior installations.
1.6 Types of lighting equipment

Floodlights these can be used to accommodate most outdoor


security lighting needs, including the illumination of boundaries, fences
and buildings and for the emphasis of vital areas or particular
buildings.
Streetlights this lighting equipment received the most widespread
notoriety for its value in reducing crime.
Searchlights these are highly focused incandescent lamp and are
designed to pinpoint potential trouble spots.
Fresnel lights -these are wide beam units, primary used to extend the
illumination in long, horizontal strips to protect the approaches to the
perimeter barrier. Fresnel projects a narrow, horizontal beam that is
approximately 180 degrees in the horizontal and from 15 to 30
degrees in the vertical plane.

H. Meaning of alarm
An alarm is an aural or visual signal given by the annunciators to security
when intruder actuates device in a protected area.
1.1 Basic parts of alarm system

Sensor or trigger device it emits the aural or visual signals or


both.
Transmission line a circuit which transmit the message to the
signaling apparatus.
Enunciator it is the signaling system that activities the alarm.

1.2 Types of protective alarm

Central station system a type of alarm where the control station


is located outside the plant or installation. When the alarm is
sounded or actuated by subscriber, the central station notifies the
police and other public safety agencies.
Proprietary system centralized monitor of the proprietary alarm
system is located in the industrial firm itself with a duty operator. In
case of alarm, the duty operator calls whatever is the primary
need: firefighters, police, ambulance or a bomb disposal unit.
Local alarm this system consists of ringing up a visual or audible
alarm near the object to be protected.
Auxiliary alarm company-owned alarm system with a unit in the
nearest police station so that in case of need, direct call is
possible.
Local alarm by chance system this is local alarm system in which
a bell or siren is sounded with no predictable response.
Dial alarm system this system is set to dial a predetermined
number or numbers when the alarm activate.

1.3 Kinds of alarm

Audio detection device it will detect any sound caused by


attempted force entry.
Vibration detection device it will detect any vibration caused by
attempted force entry.
Metallic foil or wire it will detect any action that moves that foil or
wire.
Laser beam alarm a laser emitter floods a wall or fencing with a
beam so that when this disturbed by a physical object, an alarm is
activated.
Photoelectric or electric eye device an invisible/visible beam is
emitted and when this is disturbed or when in intruder break
contact with the beam, it will activate the alarm.
Microwave motion detection device a pattern of radio waves is
transmitted and partially reflected back to an antenna. Very
effective for protection of interior areas.

I. Meaning of lock

A lock is defined as a mechanical ,electrical, hydraulic or electronic device


designed to prevent entry into a building, room, container or hiding place.
1.1 Types of lock

Key operated mechanical lock it uses some sort of arrangement


of internal physical barriers(wards tumblers) which prevent the
lock from operating unless they are properly aligned.

1.2 Types of key

Change key a specific key, which operates the lock and has a
particular combination of cuts, or biting, which match the
arrangement of the tumblers in the lock.
Sub master key a key that will open all the lock within a
particular area or grouping in a given facility.
Master key a special key capable of opening a series of lock.
Grand master key a key that will open everything in a system
involving two or more master key groups.

1.3 Key control

Key cabinet a well-constructed cabinet will have to be procured.


Key record some administrative means must be set up to record
code numbers and indicates to whom keys to specific locks have
been issued.
Inventories periodic inventories will have to be made of all
duplicate and original keys in the hands of eh employees whom
they have been issued.
Audits in addition to periodic inventory, an unannounced audit
should be made of all key control records and procedures by a
member of management.
Daily report a daily report should be made to the person
responsible for key control from the personnel department
indicating all persons who have left or will be leaving the
accompany.

1.4 Three types of security cabinet


A. Safe a metallic container used for the safekeeping of
documents or small items in an office or installations.

B.

C.

Fire endurance a safe should not have at any one time a


temperature above 350 degrees Fahrenheit.
Explains hazard test Test to determine it sudden rise in
temperature will not cause the safe to rupture.
Fire and impact test aimed at determining the strength of a
safe to withstand the collapse of a building during fire.
Vault heavily constructed fire and burglar resistance container
usually a part of the building structure used to keep and protect
cash, documents and negotiable instruments.
File room a cubicle in a building constructed a little lighter than a
vault but of bigger size to accommodate limited people to work on
the records inside.

1.5 Types of control area


1. Controlled area are those areas where access is restricted as to
entrance or movement by all authorized personnel and vehicles.
2. Limited area are those within the controlled area where a
greater degree of security is required.
3. Exclusion area are used only for handling and storage of high
value cargo and classified documents.

J. Meaning of security
Security education is conducted to develop security awareness among
employees in the company. It should cover all employees regardless of
rank or position.
1.1 Phases of security education

Initial interview it is the first contact of the prospective


employee wherein the interviewer determines the suitability of
the applicant for employment through his given answers on the
different type of the questions being conducted.
Orientation and training it is in this stage where new
employees receive detailed presentation of personnel security
policy.
Refresher conference it is designed to remind employees of
the company about their responsibilities, review the guidelines
and policies, introduction of new policies and regulations and a
movement of getting employees feedback about the company
policies that is being implemented.

Security reminders This employed as an indirect approach of


educating the employees, such as positing security posters and
distributing filers.
Security promotion it is the act of emphasizing the importance
and role of security achieving the company goals and
objectives. It involves security employee cooperation and
support.

K. Kinds of document

Personal letters, diary and notebooks. These should be


treated usually the same with official document.
Official orders, manuals, letters, overlays, maps and
magazines. You may be careful and follow the chain of
command.
1.1 Document/information
Each document or information has a life cycle in the sense that is
usefulness has a beginning and an end. It passes various stages from
the time it is created until it is finally disposed. This consists of the
following.
1.
2.
3.
4.
5.
6.
7.

Creation
Classification
Storage
Retrieval
Retention/purging
Transfer
Disposition

1.2 Categories of document

Category A a)information which contains reportable time


sensitive, order of battle and significant informations, b)it
should be given priority because it is critical information, c)it
must be forwarded without delayed, d)it is critical to friendly
operations, e)it requires immediate action.
Category B a) anything that contains communications,
cryptographic documents, or systems that should be classified
a secret and requires special handling, b) Higher authorities
should declassify it.

Category C a )Other information, which contains something


that, could be an intelligence value, b ) Contains exploitable
information regardless of its contents, c ) Unscreened
materials/documents should be categorized as Category C.
Category D a ) No value, yet lower level will never classify
documents as Category D, b )No decision must be made at the
lower echelon that document has no value.it is the responsibility
of the higher headquarters.

1.3 Four types of classified matter

TOP SECRET (green color code) is any information and


materials the authorized disclosure of it would cause
exceptionally grave damage to the nation, politically,
economically and military operation.
SECRET (red color) is any information and material, the
unauthorized disclosure of it would endanger national security
cause serious injury to interest or prestige of the nation or any
governmental activity or advantage to a foreign.
CONFIDENTIAL (blue color code) is any information or
material, the unauthorized disclosure or material, the
unauthorized disclosure of it would be prejudicial to the interest
and prestige of the national or governmental activity or would
cause administrative, embarrassment or unwanted injury to and
be of advantage to and be of advantage to a foreign country.
RESTRICTED (white or no color) is any information and
material which requires special protection other than those
determines confidential, secret and top secret.

1.4 Types of document

Class I Vital documents:


In this category these are records that are of which
reproduction does not have the same value as the original,
records needed to recover cash, to replace building,
equipments , raw materials, finished products, and work in
process and records needed to avoid delay in restoration of
production, sales and services.
Class II Important documents:
This includes records the reproduction of which will close
considerable expense and labor, or considerable delay.
Class III Useful documents:

This includes records whose loss might cause


inconvenience but could be readily replaced and which
would not in the meantime present an insurmountable
obstacle to the prompt restoration of the business.
Class IV - Non- essential Documents:
This records are daily files, routine in nature even if lost or
destroyed, will not affect operation or administration. This
class represents the bulk of records which should not be
even attempted to be protected in event of disasters. They
should, however, kept in ordinary files ready for reference,
if , needed, and usually discarded after some period of time.

L. Crisis management meaning


Is the totality of action of handling or responding to a given crisis
situation.
1.1 Kinds of crisis according to origin
A. Natural crisis- events caused by force of nature.
B. Man-made crisis- events caused by through instrumentality of men.

M. Security inspection meaning


Is conducted for two reasons: to check on the degree of compliance
with the recommended counter measures and to determine the
effectiveness and adequacy of the counter measures which are in effect.
1.1 Types of security inspection

Continuous inspection To keep pace with the constant


changes in the organization, changes in our security terms of
attitudes, life-style and moral values, and the rapid
advancement of technological modifications are all around us,
the inspection must be an on-going and never ending activity.
Formal or informal For the company which has just upgraded
the security function, hired a new security administrator, or
initiated a security department and program. Formal inspection
is one which

Structured or unstructured inspection

1.2 EMERGENCY defined


Emergency is a sudden , generally unexpected occurrence or set or
circumstances demanding immediate action.
1.3 DISASTER defined
Disaster is the unscheduled event that causes by emergency. It upset
the performance of valued activities of the community in two ways
there is a drastic increase in demand for certain services and there is
reduction in the capability to perform services.
1.4 CRISIS defined
Crisis is the turning point of disaster of emergency, if not contained or
controlled.
1.5 SECURITY INVESTIGATION defined
Is a planned and organized determination of facts concerning specific
loss or damage of assets due to threats hazard or unsecured
conditions.
1.6 Element of investigation

Investigator
Purpose
Subject of investigation

Table of contents
Portfolio Entries:
a.
b.
c.
d.
e.
f.

Meaning of industrial security


Reflection of industrial security management
Importance of security
Major areas of security
Types of security
Barriers defined
1.1 Purpose of barriers
1.2 Kinds of barriers
1.3 Classification of barriers
1.4 Three lines of physical defense
g. Perimeter barriers
1.1 Types of perimeter barrier
1.2 Types of fence
1.3 Types of full-view fence
1.4 The perimeter barrier opening

h.

i.

j.
k.

l.
m.

n.
o.
p.

1.5 Types of protective lighting


1.6 General types of lighting source
1.7 Types of lighting equipment
Meaning of alarm
1.1 Basic Parts of alarm system
1.2 Types of protective alarm
1.3 Kinds of alarm
Meaning of lock
1.1 Types of lock
1.2 Types of key
1.3 Key control
1.4 Three types of security cabinet
1.5 Kinds of control area
Meaning of security education
1.1 Phases of security education
Kinds of document
1.1 Document/information
1.2 Categories of document
1.3 Four types of classified matter
1.4 Types of document
Crisis management meaning
1.1 Kinds of crisis according to origin
Security inspection meaning
1.1 Types of security inspection
1.2 Emergency define
1.3 Disaster define
1.4 Crisis define
1.5 Security investigation define
1.6 Element of investigation
1.7 Tools of investigation
1.8 Three aims in investigation
1.9 Guidelines in investigation
Example of an investigation report
Reflection on your work (portfolio)
Documentation-exams, quizzes, assignment.

Industrial and security


management

Submitted by: Monique C. Bascon


Submitted to: Mr. Vincent Chua

You might also like