Professional Documents
Culture Documents
Lea 3 Module 3
Lea 3 Module 3
Welcome Notes:
I. INTRODUCTION:
This module introduces physical security, which refers to the logical set of tangible
elements and measures adopted to prevent unauthorized to equipment, facilities, materials,
documents and personnel.
II. OBJECTIVES:
Before you proceed to the main lesson, test yourself in this activity.
DIRECTION: Complete the blanks below to form words related to the lesson. Good luck!
1. S C Y 4. C N R l
2. F R E 5. L C
3. B R I R 6. L G T I G
Introduction to Industrial Security Concept Page 2 of 13
Module 3: Categories of Security and Physical Security
GREAT!!!
You may now proceed to the main lesson.
LET’S BEGIN
Based on the preliminary activities, what did you notice about it?
CONGRATULATIONS!
1. Site Characteristics
Selection of safeguards can be influenced by the nature of the site such as the size, layout,
utilities, internal activities and assets in the site. Other factors may include company philosophy
and workforce culture.
Physical Barriers
A barrier is a natural or manufactured obstacle to the movement of persons, animals,
vehicles or materials. It defines physical limits to and delays or prevents penetration of an area
(POA Publishing LLC, 2003).
.
Introduction to Industrial Security Concept Page 3 of 13
Module 3: Categories of Security and Physical Security
1. To control the movement of people and vehicles into, out of, and within the facility.
2. To segregate or compartmentalize sensitive areas
3. To provide physical protection to objects, materials, and processes of critical nature.
1. Natural Barriers includes bodies of water, mountains, marshes, ravines, deserts or other
terrain that are difficult to cross.
2. Structural Barriers are ma- made barriers such as fences, walls, floors, roofs, grills, bars,
roadblocks or other physical means.
1. Roadblocks
2. Walls
Other Types of Physical Barriers
1. Human Barrier
The guard force as a human barrier is the key elements in any security system. Without it,
all other protective devices –mechanical electrical electronic- would be a useless security
action.
2. Animal Barrier
The most common of animal barriers are dogs known as the K-9 team. The number of
dogs to be used relies on the size and kind of installation being secured. The most popular
breed is the German shepherd.
2. Building Walls -Walls, floors or their combinations serve also as barriers and must be of such
construction to provide uniform protection just like the wire fencing.
3. Bodies of Water - like river, lakes, marsh, ponds or other bodies of water forming part of the wall,
building or fencing should never be considered adequate natural perimeter barrier.
Floors - Wooden floors normally have flush sheathing covering the joists diagonally. This surface may then
be covered with building papers and flooring such as tile, cork, rubber, linoleum or wood.
Interior Walls - Interior walls and ceiling may be constructed of lath and plaster. However,
Ceilings- may be covered with acoustic or decorative tile. It is a common modern building technique to
construct ceiling plenums that do not have security barriers between rooms and areas.
Doorways- including the frame, jambs, and stops are constructed of either wood or metal. Doorways are of
two general applications: personnel and vehicular.
Windows - are designed to provide ventilation, natural illumination or visual access through a wall, or any
combination of the three.
Other openings
In addition to doors and windows, a wide variety of other openings in the roof, walls and floor may
require consideration. These includes opening for shafts, vents, ducts or fans; utility tunnels or chases for
heat, gas, water, electric power and telephone; sewers and other types of drains; and other small service
openings.
Introduction to Industrial Security Concept Page 6 of 13
Module 3: Categories of Security and Physical Security
Establishing interior controls not only maximizes the efforts of security guards. Such measures also
allow or deny access to facilities or areas within the facility, as well as track the identity and times of entry
and exit.
There are a variety of techniques to control access to the interiors of high-security facility.
Locks
Installing locks on doors is the easiest line of defense inside a facility.
1. Locks are only as good as the door, jambs, and walls around them. A lock is therefore useless
if an intruder can access a facility.
2. Key management is important when dealing with a complete lock system. It is important to
make sure that only authorized personnel can obtain or make key to the lock.
3. All locks can be compromised by an expert in a very short period of time. It is therefore wise to
use locks together with other security measure and as part of an overall physical protection
system.
Telephone Entry Systems - commonly used in apartment buildings and condominiums. They are typically
located outside the building, with a panel, handset and touchpad. Each tenant has a special entry code that
a visitor dials. The tenant may then release the door lock by pressing a designated key on the residence
phone. For added security, some systems add a CCTV camera in the entry lobby with small monitors
provided to each occupant (POA Publishing LLC, 2003).
Identification Systems
Controlled entry into a business facility usually begins with the identification of the person entering. The
identity of employees or visitors can be determined through the following types of identification verification
and access control.
1. Guards can personally recognize or inspect the identification of employees or visitors, and then
formulate a judgment of that person’s validity.
2. Card reader systems can compare the coded identification cards with computer records for
authorized personal verification.
3. Biometric readers can use a person’s physical property (such as retinal pattern or fingerprint) to
gain entry.
Types of protective alarm systems, auxiliary system, central station system and proprietary system
These can serve the purpose of either substituting other security measures for economic reasons or
supplement these security measures to provide additional controls.
Sensors can detect when an intruder penetrates the facilities boundary. It can also “sense”
unexplained presence within a zone or in close proximity to a protected object. When the intrusion is
Introduction to Industrial Security Concept Page 7 of 13
Module 3: Categories of Security and Physical Security
detected, the sensors are calibrated to activate and causes a monitoring station of a protected facility (Fay,
2006).
Sensors can perform three main functions. They can detect intruders, such as when it reacts to the
intruder’s motion, sound or body heat. They can also open a door. Finally, a sensor can turn on a device,
such as when it reacts to movement and automatically turns on security lights.
Protective Lighting
Protecting lighting is designed to illuminate the perimeter barrier and the outside approaches of an
area. A threat cannot be detected, either camera or in person, if there is no light. Lighting can also serve as
deterrence since a threat is no light. Lighting can also serve as deterrence since a threat is more likely to
attack an asset in relative darkness than in bright light.
ACTIVITY 1
Name: Year & Section:
DIRECTION: Match the concrete structure in Column A with its description in Column B.
Column A Column B
ACTIVITY 2
1. Physical security describes the measures that are designed to deny access to unauthorized
personnel from physically accessing a building, facility, etc.
ANSWER:
2. Building Exterior is the 1st line of defense.
ANSWER:
3. Physically and mentally fit is one of the basic qualification of Security Guard.
ANSWER:
4. Private Detective Agency any person who is not a member of a regular police agency or armed
forces that does detective work for hire, reward or commission.
ANSWER:
5. There are 6 Types of Barriers.
ANSWER:
VI. GENERALIZATION
KUDOS!
You have come to an end of Module.
OOPS! Don’t forget that you have still an assignment to do.
Here it is….
Introduction to Industrial Security Concept Page 11 of 13
Module 3: Categories of Security and Physical Security
VII. ASSIGNMENT
(1) ___________________ Entry Systems is commonly used in apartment buildings and (2)
_________________________. They are typically located outside the building, with a panel, (3)
________________ and touchpad. Each tenant has a (4) ______________________ entry code that a
visitor dials. The tenant may then release the door lock by pressing a designated key on the residence
phone. For added security, some systems add a CCTV camera in the entry lobby with small monitors
provided to each (5) _____________________ (POA Publishing LLC, 2003).
VIII. EVALUATION
1. It is the protection resulting from the application of various measures which safeguards cash and assets
which in storage, in transit and during transaction.
A. Bank Security
B. Hotel Security
C. Corporate Security
D. Communication Security
2. It is resulting from the protection of processes, formulas, patents and industrial and manufacturing
activities from espionage.
A. Document Security
B. Operational Security
C. Corporate Security
D. Communication Security
3. It is resulting from the protection of application of various measures which prevent or delay the enemy or
unauthorized person in gaining information.
A. Document Security
B. Operational Security
C. Corporate Security
D. Communication Security
4. It is resulting from the protection classified papers and vital records from loss, access to unauthorized
persons, damage, theft and etc.
A. Document Security
B. Operational Security
C. Corporate Security
D. Communication Security
5. The providing of sufficient illumination to areas during hours of darkness to insure visibility and to act as
a deterrent to the intruders.
A. Security Alarm system
B. Security Lighting
C. Security Surveillance
D. Security Flash light
6. It is resulting from the protection top ranking officials of the government or visiting persons of illustrious
standing.
A. Document Security
Page 13 of 13
Introduction to Industrial Security Concept
Categories of Security
B. Operational Security
C. Corporate Security
D. VIP Security
7. It is the sum total of all physical safeguards employed or installed to secure the assets.
A. Physical Security
B. Document Security
C. Personnel Security
D. Internal Security
8. What line of defense is grill?
A.1st line of defense
B. 2nd line of defense
C. 3rd line of defense
D. Barrier Line
9. What line of defense is cabinet?
A.1st line of defense
B. 2nd line of defense
C. 3rd line of defense
D. Barrier Line
10. What line of defense is guard?
A.1st line of defense
B. 2nd line of defense
C. 3rd line of defense
D. Barrier Line