Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Introduction to Industrial Security Concept Page 1 of 13

Module 3: Categories of Security and Physical Security

Module 3: CATEGORIES OF SECURITY AND PHYSICAL SECURITY

Welcome Notes:

WELCOME CRIMINOLOGY STUDENTS

I. INTRODUCTION:
This module introduces physical security, which refers to the logical set of tangible
elements and measures adopted to prevent unauthorized to equipment, facilities, materials,
documents and personnel.

II. OBJECTIVES:

At the end of this module, the student will be able to:


1. Define physical Security;
2. Explain the purpose and advantage of physical barriers and the lines of defense; and,
3. Characterize protective alarm sensors and protective lighting

III. PRELIMINARY ACTIVITIES:

Before you proceed to the main lesson, test yourself in this activity.

DIRECTION: Complete the blanks below to form words related to the lesson. Good luck!
1. S C Y 4. C N R l
2. F R E 5. L C
3. B R I R 6. L G T I G
Introduction to Industrial Security Concept Page 2 of 13
Module 3: Categories of Security and Physical Security

GREAT!!!
You may now proceed to the main lesson.

IV. LESSON PROPER

LET’S BEGIN

Based on the preliminary activities, what did you notice about it?

CONGRATULATIONS!

Principles of Physical Security


In considering the appropriate security measures, the following principles should be considered.
1. The type of access necessary depends on the number of variable factors, thus, may be
obtained in different ways.
2. There are no such things as an impenetrable barrier.
3. The installation of a barrier varies from another.
4. There is defense in barrier depth.

Factors in Selecting Security Safeguards

1. Site Characteristics

Selection of safeguards can be influenced by the nature of the site such as the size, layout,
utilities, internal activities and assets in the site. Other factors may include company philosophy
and workforce culture.

2. Environment - refers to the area surrounding the facility.


3. Forces of Nature - Also at play in the selection of safeguards are the environment’s climates.
Weather and natural forces.
4. Crime - Crime patterns must be considered in selecting the necessary countermeasures.

Physical Barriers
A barrier is a natural or manufactured obstacle to the movement of persons, animals,
vehicles or materials. It defines physical limits to and delays or prevents penetration of an area
(POA Publishing LLC, 2003).

.
Introduction to Industrial Security Concept Page 3 of 13
Module 3: Categories of Security and Physical Security

Advantages of physical Barriers

1. Physical barriers become a psychological deterrence when a potential intruder is


discouraged from accessing a facility because the barrier appears to present difficulties.
2. Actual difficulty in getting through physical barriers.
3. Reducing the cost of security staffing by substituting barriers for people, and placing
security posts in locations the complement barriers.

Purpose of Physical Barriers

1. To control the movement of people and vehicles into, out of, and within the facility.
2. To segregate or compartmentalize sensitive areas
3. To provide physical protection to objects, materials, and processes of critical nature.

General Types of Physical Barriers

1. Natural Barriers includes bodies of water, mountains, marshes, ravines, deserts or other
terrain that are difficult to cross.
2. Structural Barriers are ma- made barriers such as fences, walls, floors, roofs, grills, bars,
roadblocks or other physical means.
1. Roadblocks

2. Walls
Other Types of Physical Barriers

1. Human Barrier
The guard force as a human barrier is the key elements in any security system. Without it,
all other protective devices –mechanical electrical electronic- would be a useless security
action.

2. Animal Barrier
The most common of animal barriers are dogs known as the K-9 team. The number of
dogs to be used relies on the size and kind of installation being secured. The most popular
breed is the German shepherd.

First Line of Defense: The perimeter Barrier


The usual starting point in assessing risk at a facility is the perimeter. The major purpose
of the use of perimeter as barrier is to deny access or exit of unauthorized persons.
Introduction to Industrial Security Concept Page 4 of 13
Module 3: Categories of Security and Physical Security

Purpose of the perimeter Barrier


 To define the boundary of the property to be secured
 To create a physical and psychological deterrence to unauthorized entry.
 To delay intrusion, thus facilitating the apprehension of intruders.
 To assist in a more efficient and economical employment of guards.
 To facilitate and improve the control of pedestrian and vehicular traffic.

Types of Perimeter Barriers


1. Wire Fences (Solid or Full –View)
1.1. Chain Link Fence

 Must be constructed of 7- foot material excluding top guard.


 Must be of 9-gauge or heavier
 Mesh openings are not to be larger than 2 inches per side
 Should be a twisted and barbed selvage at top and bottom
 Must be securely fastened to right metal or reinforced concrete
 Must be reached within 2 inches of hard ground or paving
 On soft ground, must reach below surface deep enough to compensate for shifting soil or
sand

1.2. Barbed Wire Fence


 Standard barbed wire is twisted, double-strand,12 gauge wire with 4-point barbs spaced at
an equal distance apart
 Must be less than seven feet high, excluding top guard
 Must be firmly affixed to post not more than six feet apart
 The distance between strands must not exceed 6 inches and least one wire will be interlaced
vertically and midway between posts.

1.3. Concertina Wire Fence


 Standard concertina barbed wire is a commercially manufactured wire coil of high strength
steel barbed wire clipped together at intervals to form a cylinder.
 Opened concertina wire is 50 feet long and 3 feet in diameter

1.4. The top Guard


 A top guard is an overhead of barbed wire along the top of the fence, facing outward and
upward at approximately 45-degree angle.
 Top guard supporting arms will be permanently affixed to the top of the fence post to increase
the overall height of the fence at least one foot
 Three strands of barbed wire, spaced 6 inches apart must be installed on the supporting arms.
Introduction to Industrial Security Concept Page 5 of 13
Module 3: Categories of Security and Physical Security

1.5 Clear Zones


 A clear zone 20 feet or more should exist between the perimeter and barrier and exterior
structure, parking areas and natural or man-made features.
 A clear zone of 50 feet or more should exist between the perimeter barrier and structures
within the protected areas except when a building wall constitutes part of the perimeter
barrier. And structures within the protected areas except when a building wall constitutes part
of the perimeter barrier.

2. Building Walls -Walls, floors or their combinations serve also as barriers and must be of such
construction to provide uniform protection just like the wire fencing.
3. Bodies of Water - like river, lakes, marsh, ponds or other bodies of water forming part of the wall,
building or fencing should never be considered adequate natural perimeter barrier.

Second Line of Defense: Building Exteriors


a. Roofs - roof usually has sheathing placed over the rafters, often horizontal wooden boards placed
flush on the rafters.
b. Exterior Walls - may be similarly constructed, with sheathing place diagonally on vertical studs
and covered with sheathing paper.
c. Concrete Structures
An ordinary concrete building wall, because of its rugged and formidable appearance, may give the
impression that it offers good protection against penetration, but may not.

Floors - Wooden floors normally have flush sheathing covering the joists diagonally. This surface may then
be covered with building papers and flooring such as tile, cork, rubber, linoleum or wood.

Interior Walls - Interior walls and ceiling may be constructed of lath and plaster. However,

Ceilings- may be covered with acoustic or decorative tile. It is a common modern building technique to
construct ceiling plenums that do not have security barriers between rooms and areas.

Doorways- including the frame, jambs, and stops are constructed of either wood or metal. Doorways are of
two general applications: personnel and vehicular.

Windows - are designed to provide ventilation, natural illumination or visual access through a wall, or any
combination of the three.

Other openings
In addition to doors and windows, a wide variety of other openings in the roof, walls and floor may
require consideration. These includes opening for shafts, vents, ducts or fans; utility tunnels or chases for
heat, gas, water, electric power and telephone; sewers and other types of drains; and other small service
openings.
Introduction to Industrial Security Concept Page 6 of 13
Module 3: Categories of Security and Physical Security

Third Line of Defense: Interior Controls

Establishing interior controls not only maximizes the efforts of security guards. Such measures also
allow or deny access to facilities or areas within the facility, as well as track the identity and times of entry
and exit.
There are a variety of techniques to control access to the interiors of high-security facility.
Locks
Installing locks on doors is the easiest line of defense inside a facility.

1. Locks are only as good as the door, jambs, and walls around them. A lock is therefore useless
if an intruder can access a facility.
2. Key management is important when dealing with a complete lock system. It is important to
make sure that only authorized personnel can obtain or make key to the lock.
3. All locks can be compromised by an expert in a very short period of time. It is therefore wise to
use locks together with other security measure and as part of an overall physical protection
system.

Telephone Entry Systems - commonly used in apartment buildings and condominiums. They are typically
located outside the building, with a panel, handset and touchpad. Each tenant has a special entry code that
a visitor dials. The tenant may then release the door lock by pressing a designated key on the residence
phone. For added security, some systems add a CCTV camera in the entry lobby with small monitors
provided to each occupant (POA Publishing LLC, 2003).

Identification Systems
Controlled entry into a business facility usually begins with the identification of the person entering. The
identity of employees or visitors can be determined through the following types of identification verification
and access control.
1. Guards can personally recognize or inspect the identification of employees or visitors, and then
formulate a judgment of that person’s validity.
2. Card reader systems can compare the coded identification cards with computer records for
authorized personal verification.
3. Biometric readers can use a person’s physical property (such as retinal pattern or fingerprint) to
gain entry.

Protective Alarm Sensors


Different types of protective alarm installed indoors or outdoors complement and supplement
physical barriers. These systems are designed to alert security personnel to completed or attempted
intrusion into an area, building or compound.

Types of protective alarm systems, auxiliary system, central station system and proprietary system
These can serve the purpose of either substituting other security measures for economic reasons or
supplement these security measures to provide additional controls.
Sensors can detect when an intruder penetrates the facilities boundary. It can also “sense”
unexplained presence within a zone or in close proximity to a protected object. When the intrusion is
Introduction to Industrial Security Concept Page 7 of 13
Module 3: Categories of Security and Physical Security

detected, the sensors are calibrated to activate and causes a monitoring station of a protected facility (Fay,
2006).
Sensors can perform three main functions. They can detect intruders, such as when it reacts to the
intruder’s motion, sound or body heat. They can also open a door. Finally, a sensor can turn on a device,
such as when it reacts to movement and automatically turns on security lights.

Protective Lighting
Protecting lighting is designed to illuminate the perimeter barrier and the outside approaches of an
area. A threat cannot be detected, either camera or in person, if there is no light. Lighting can also serve as
deterrence since a threat is no light. Lighting can also serve as deterrence since a threat is more likely to
attack an asset in relative darkness than in bright light.

Purpose of Protective Lighting


 To provide sufficient illumination to an area during hours of darkness
 To improve visibility in order to easily spot, identify and even apprehend intruders
 To present psychological fear
 To serve as deterrent to thieves, pilferer, trespasser and saboteurs

General Characteristics of Protective Lighting


 It is relatively inexpensive to maintain
 It may reduce the need for security forces
 It may provide personal protection for security forces by reducing the element of surprise by the
intruder
 It requires less intensity than working light

Types of Protective Lighting


 The stationary luminary is the most common type consisting of a series of fixed luminaries.
 The standby lighting provides continuous illumination of a protected area during the hours of
darkness, but it can be turned on manually or by special device or other automatic means.
 Movable lightning can be stationary or portable and consists of manually operated searchlights. It
may be lighted continuously during hours of darkness or only as needed. It can supplement or
temporarily replace other types of security lighting.
 Emergency Lighting is a standby lighting can be utilized in the event of electric failure, either due to
local equipment or commercial power failure.

We had just finished the discussion on CATEGORIES OF


SECURITY AND PHYSICAL SECURITY. Let’s move on to the
next higher level of activity/ies or exercise/s that demonstrate your
potential skills/knowledge of what you have learned.
Introduction to Industrial Security Concept Page 8 of 13
Module 3: Categories of Security and Physical Security

V. ANALYSIS, APPLICATION AND EXPLORATION

ACTIVITY 1
Name: Year & Section:

DIRECTION: Match the concrete structure in Column A with its description in Column B.

Column A Column B

1. Floors A. Wooden ________________ normally have flush sheathing


covering the joists diagonally. This surface may then be
2. Interior Walls covered with building papers and flooring such as tile, cork,
3. Ceilings rubber, linoleum or wood.
4. Doorways
B. _________ and ceiling may be constructed of lath and
5. Windows plaster.

C. may be covered with acoustic or decorative tile. It is a


common modern building technique to construct ceiling
plenums that do not have security barriers between rooms
and areas.
D. including the frame, jambs, and stops are constructed of
either wood or metal. Doorways are of two general
applications: personnel and vehicular.

E. are designed to provide ventilation, natural illumination or


ACTIVITY
visual 2 through a wall, or any combination of the
access
three.
Introduction to Industrial Security Concept Page 9 of 13
Module 3: Categories of Security and Physical Security

ACTIVITY 2

Name: Year & Section:

DIRECTION: Determine if the following statement is TRUE or FALSE.

1. Physical security describes the measures that are designed to deny access to unauthorized
personnel from physically accessing a building, facility, etc.
ANSWER:
2. Building Exterior is the 1st line of defense.
ANSWER:
3. Physically and mentally fit is one of the basic qualification of Security Guard.
ANSWER:
4. Private Detective Agency any person who is not a member of a regular police agency or armed
forces that does detective work for hire, reward or commission.
ANSWER:
5. There are 6 Types of Barriers.
ANSWER:

Finally, let us summarize the lesson of what we had discussed today.


Introduction to Industrial Security Concept Page 10 of 13
Module 3: Categories of Security and Physical Security

VI. GENERALIZATION

Name: ____________________________________ Year and Sec.: __________________


DIRECTION: Explain the Principles of Physical Security in 50 words. Rubric is attached for reference.

Level Description Score


 Well written and very organized.
 Excellent grammar mechanics.
 Clear and concise statements.
OUTSTANDING
 Excellent effort and presentation with detail.
9-10
 Demonstrates a thorough understanding of the
topic.
 Writes fairly clear.
 Good grammar mechanics.
GOOD
 Good presentation and organization.
7-8
 Sufficient effort and detail
 Minimal effort.
 Good grammar mechanics.
FAIR
 Fair presentation.
6
 Few supporting details.
 Somewhat unclear.
 Shows little effort.
POOR  Poor grammar mechanics. 5
 Confusing and choppy, incomplete sentences.
 No organization of thoughts.

KUDOS!
You have come to an end of Module.
OOPS! Don’t forget that you have still an assignment to do.
Here it is….
Introduction to Industrial Security Concept Page 11 of 13
Module 3: Categories of Security and Physical Security

VII. ASSIGNMENT

Name: Grade & Section:

Direction/Instruction: Complete the following sentences below. Choices are provided.

(1) ___________________ Entry Systems is commonly used in apartment buildings and (2)
_________________________. They are typically located outside the building, with a panel, (3)
________________ and touchpad. Each tenant has a (4) ______________________ entry code that a
visitor dials. The tenant may then release the door lock by pressing a designated key on the residence
phone. For added security, some systems add a CCTV camera in the entry lobby with small monitors
provided to each (5) _____________________ (POA Publishing LLC, 2003).

Regular telephone occupant handset special


Condominiums cellphone

After your long journey of reading and


accomplishing the module, let us now challenge your mind
by answering the evaluation part of this module.
Page 12 of 13
Introduction to Industrial Security Concept
Categories of Security

VIII. EVALUATION

Name: Grade & Section: _

Direction/Instruction: Directions: Encircle the letter of the correct answer

1. It is the protection resulting from the application of various measures which safeguards cash and assets
which in storage, in transit and during transaction.
A. Bank Security
B. Hotel Security
C. Corporate Security
D. Communication Security
2. It is resulting from the protection of processes, formulas, patents and industrial and manufacturing
activities from espionage.
A. Document Security
B. Operational Security
C. Corporate Security
D. Communication Security
3. It is resulting from the protection of application of various measures which prevent or delay the enemy or
unauthorized person in gaining information.
A. Document Security
B. Operational Security
C. Corporate Security
D. Communication Security
4. It is resulting from the protection classified papers and vital records from loss, access to unauthorized
persons, damage, theft and etc.
A. Document Security
B. Operational Security
C. Corporate Security
D. Communication Security
5. The providing of sufficient illumination to areas during hours of darkness to insure visibility and to act as
a deterrent to the intruders.
A. Security Alarm system
B. Security Lighting
C. Security Surveillance
D. Security Flash light
6. It is resulting from the protection top ranking officials of the government or visiting persons of illustrious
standing.
A. Document Security
Page 13 of 13
Introduction to Industrial Security Concept
Categories of Security

B. Operational Security
C. Corporate Security
D. VIP Security
7. It is the sum total of all physical safeguards employed or installed to secure the assets.
A. Physical Security
B. Document Security
C. Personnel Security
D. Internal Security
8. What line of defense is grill?
A.1st line of defense
B. 2nd line of defense
C. 3rd line of defense
D. Barrier Line
9. What line of defense is cabinet?
A.1st line of defense
B. 2nd line of defense
C. 3rd line of defense
D. Barrier Line
10. What line of defense is guard?
A.1st line of defense
B. 2nd line of defense
C. 3rd line of defense
D. Barrier Line

CONGRATULATIONS on reaching the end of this module!


You may now proceed to the next module.
Don’t forget to submit all the exercises, activities and portfolio
on .
KEEP UP THE GOOD WORK.

You might also like