Week 1 - Summer PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

INTRODUCTION

TO INDUSTRIAL
SECURITY CONCEPTS
R A N D A L L LY N B . B L A S C O , R C R I M .
A. SECURITY IN GENERAL
1. Definition of Security

Security, in a collective sense, is the same as protection and safety;


the state of being safe and the condition of being protected
against physical, social, spiritual, financial, political, emotional,
occupational, psychological or other types or consequences of
failure, damage, error, accidents, harm or any other event which
could be considered not desirable. Security is also freedom from
fear, harm, danger, loss, destruction or damages.
2. Fields of Security
The following are the fields of security classified
according to each sphere or subjects:
1. IT Fields
2. Physical Security
3. Political Field
4. Monetary Field
A) IT FIELDS
• Computing Security – is a branch of information security applied to
both theoretical and actual computer systems. Computer security is
a branch of computer science that addresses enforcement of
“secure” behavior on the operation of computers.

• Data Security - is the means of ensuring that data is kept safe from
corruption and that access to it is suitably controlled. Thus, data
security helps to ensure privacy. It also helps in protecting personal
data.
• Application Security – encompasses measures taken to
prevent exceptions in the security policy of an application
or the underlying system through flaws in the design,
development, or deployment of the application.

• Information Security – means protecting information and


information systems from unauthorized access, use,
disclosure, disruption, modification or destruction.
•Network Security – consists of the provisions
made in an underlying computer network
infrastructure, policies adopted by the
network administrator to protect the network
and the network-accessible resources from
unauthorized access and the effectiveness (or
lack) of these measures combined.
B) PHYSICAL SECURITY
• Physical Security – describes measures that
prevent or deter attackers from accessing a
facility, resource, or information stored on
physical media. It can be as simple as a locked
door or as elaborated as multiple layers of
armed guard posts.
• Shopping Center Security (Mall or Supermarket) – a
type of security which is concern with the protection
of the stores, warehouses, storage, its immediate
premises and properties as well as the supermarket
personnel and customers.
• Airport Security – refers to the techniques and
methods used in protecting airports and by
extension aircraft from crime and terrorism.
•Home Security – are those methods
use of protecting residential homes or
town sites which include the interior
protection of houses against property
losses or damages.
C) POLITICAL FIELD
• International Security – consists of the
measures taken by nations and international
organizations, such as United Nations, to
ensure mutual survival and safety. These
measures include military action and
diplomatic agreements such as treaties and
conventions.
• National Security – refers to the requirement to
maintain the survival of the nation-state using
economic, military and political power and the
exercise of diplomacy.
• Human Security – refers to an emerging paradigm
for understanding global vulnerabilities whose
proponents challenge the traditional notion of
national notion of national security by arguing that
the proper referent for security should be the
individual rather than the state.
D ) M O N E TA R Y F I E L D
• Financial Security – refers to the methods
applied for the protection of fungible,
negotiable instrument representing
financial value. It broadly categorized into
debt securities, such as banknotes, bonds
and debentures, and equity securities, etc.
3. TYPES OF SECURITY
a. Industrial Security – a type of security applied to
business groups in industries like manufacturing,
assembling, research and development, processing,
warehousing and even agriculture.
b. Hotel Security – a type of security applied to hotels
where its properties are protected from pilferage, loss,
damage, and the function in the hotel restaurants are
not disturbed and troubled by outsiders or the guest
themselves.
c. Bank Security – this type of security is concern with
bank operations. Its main objective is the protection
of bank cash and assets, its personnel and clientele.

d. VIP Security – a type of security applied for the


protection of top-ranking officials of the
government or private entity, visiting persons of
illustrious standing and foreign dignitaries.
e. School Security – a type of
security that is concern with the
protection of students, faculty
members, and school properties.
PERSONNEL
SECURITY

DOCUMENT/
PHYSICAL INFORMATION
SECURITY SECURITY

4 . P R I N C I PA L D I V I S I O N S O F S E C U R I T Y
a. Personnel Security - this is as important as physical
security. Personnel Security starts even before the hiring of
an employee and remains to be maintained for as long as
the person is employed.
b. Physical Security – this concern with the physical measures
adopted to prevent unauthorized access to equipment,
facilities, material and document and to safeguard them
against espionage, sabotage, damage, loss and theft.
c. Document and Information Security - this
involves the protection of documents and
classified papers from loss, access by
unauthorized persons, damage, theft and
compromise through disclosure.
5. SECURITY MANAGEMENT
In one sense, Security Management is the proper utilization of

resources in a security organization in order to meet organizational goals

and objectives and to ensure their achievements. In another sense, it is a

broad field of management related to asset management, physical

security and human resource safety functions. It entails the identification

of an organization’s information assets and the development,

documentation and implementation of policies, standards, procedures

and guidelines.
Management tools such as
information classification, risk assessment
and risk analysis are used to identify
threats, classify assets and to rate system
vulnerabilities so that effective control can
be implemented.
T H A N K YO U !

You might also like