Professional Documents
Culture Documents
Lea 213 Module 2
Lea 213 Module 2
Learning Content:
: Concept of Security
: Protective Security System
: Physical Security
CONCEPT OF SECURITY
Since security in general is very hard to comprehend, it can be divided into three major
areas:
1. Physical Security - this concern with the physical measures adopted to prevent
unauthorized access to equipment, facilities, material and document and to safeguard
them against espionage, sabotage, damage, loss and theft.
3. Document and Information Security - this involves the protection of documents and
classified papers from loss, access by unauthorized persons, damage, theft and
compromise through disclosure. Classified documents need special handling. Lack of
indoctrination and orientation among the personal handling them can result in
the leakage, loss, theft and unauthorized disclosure of the documents.
NOTE: Physical security, personnel security, and document security cannot exist
independently- they are mutually supporting. They are in many respects overlapping.
Physical security is correlated to the other two parts, interwoven and one is essential to
the other.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim
The aspects of protective security can be seen with the application of the following:
2. Hotel Security - a type of security applied to hotels where its properties are protected
from pilferage, loss, damage and the function in the hotel restaurants are not disturbed
and troubled by outsiders or the guest themselves. This type of security employs house
detectives, uniforms guard and supervisor and ensures that hotel guests and their
personal effects are safeguarded.
3. Bank Security - this type of security is concern with bank operations. Its main objective
is the protection of bank cash and assets, its personnel and clientele. Security personnel
are trained to safeguard bank and assets while in storage, in transit and during
transactions.
5. School Security - a type of security that is concern with the protection of students,
faculty members, and school properties. Security personnel are trained to protect the
school property from theft, vandals, handling campus riots and detecting the use of
intoxicated drugs and alcohol by the students.
6. Supermarket or Mall Security - a type of security which is concern with the protection
of the stores, warehouses, storage, its immediate premises and properties as well as the
supermarket personnel and customers. Security personnel are trained to detect
“shoplifter”, robbery, and bomb detection and customer relation.
7. Other types – this includes all other security matters not covered in the above
enumeration.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim
PHYSICAL SECURITY
Physical security measures are being used to define, protect, and monitor property
rights and assets. These measures consist of barriers and devices that would
detect, impede, and prevent unauthorized access to equipment, facilities, material and
document and to safeguard them against espionage, sabotage, damage and theft.
Physical security may be also defined as the safeguarding by physical means, such
as guard, fire protection measures, of plans, policies, programs, personnel, property,
utilities, information, facilities and installation against compromise, trespass, sabotage,
pilferage, embezzlement, fraud, or another dishonest criminal act.
What is Barrier?
4. Assist in more efficient and economical employment of guards5. Facilitate and improve
the control and vehicular traffic.
Types of Barriers
2. Structural barriers - these are features constructed by man regardless of their original
intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences,
safe, cabinets or containers etc.
3. Human barriers - persons being used in providing a guarding system or by the nature
of their employment and location, fulfill security functions. Examples are guards, office
personnel, shopworkers, etc.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim
4. Animal barriers - animals are used in partially providing a guarding system. Dogs are
usually trained and utilized to serve as guard dogs. German shepherds are best suited
for security functions. Goose and turkeys could also be included.
2. Second line of defense- doors, floors, windows, walls, roofs and grills and other
entries to the buildings.
3. Third line of defense- storage system like steel cabinets, safes, vaults and interior
files.
1. The type of access necessary will depend upon a number of variable factors and
therefore maybe achieved in a number of ways.
A restricted area is any area in which personnel or vehicles are controlled for
reasons of security. Restricted area is established to provide security for installation or
facilities and to promote efficiency of security operations and economy in the use of
security personnel
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim
Two types of restricted areas may be established to permit different degrees of security
within the same installation or facility, and to provide efficient bases for the application of
different degrees of access, circulation and protection.
These restricted areas are termed Exclusion areas and Limited areas.
Exclusion Area- an exclusion area is a restricted area which contains a security interest
to TOP SECRET importance; and which requires the highest degree of protection.
Limited Area Control- a limited area isa restricted area in which a lesser degree of
control is required than in an exclusion area but which the security interest would be
compromised by uncontrolled movement.
a. Interior Area Control - Interior area control is generally affected in two ways. The
first method is the system which is initiated and terminated at the outer limits of the
area to determine the movements of a visitor within the area. A second somewhat
less means of accomplishing the same thing is time travel. This system provides
for checking the actual time used by the visitor against known time requirements
for what the visitor is to accomplish.
It is the protection of the installation’s inner and the immediate vicinity. The main purpose
of perimeter barrier is to deny or impede access or exit of unauthorized person. Basically,
it is the first line of defense of an installation. This is maybe in the form of fences, building
walls or even bodies of water.
The function and location of the facility itself usually determine the perimeter of the
installation. If the facility is located in a city whereby the facility is located in a city whereby
the building or enterprise occupies all the area where it is located, the perimeter may be
the walls of the building itself. Most of the Industrial companies, however, are required to
have a wide space for warehousing, manufacturing etc.
- Fences
- Walls
- Bodies of water
Types of Fences
1. Solid fence -constructed in such a way that visual access through the fence is
denied. Its advantage is that it denies the opportunity for the intruder to become
familiar with the personnel, activities and the time scheduled of the movements of
the guards in the installation. On the other hand, it prevents the guards from
observing the area around the installation and it creates shadow that may be used
by the intruder forcover and concealment.
2. Full-view fence -it is constructed in such a way that visual access is permitted
through the fence. Its advantages are that it allows the roving patrols and stationary
guard to keep the surrounding are of the installation under observation. On the
other hand, it allows the intruder to become familiar with the movements and
time schedule of the guard patrols thereby allowing him to pick the
time that is advantageous on his part.
As a standard, the distance between strands must not exceed 6 inches at least one wire
will be interlaced vertically and midway between posts.
1. Gates and Doors - when not in use and controlled by guards, gates and doors in the
perimeter should be locked and frequently inspected by guards. Locks should
be changed from time to time and should be covered under protective locks and key
control.
2. Side-walk-elevators- these provide access to areas within the perimeter barrier and
should be locked and guarded.
3. Utilities Opening - sewers, air intakes, exhaust tunnels and other utility openings
which penetrate the barrier and which have cross sectional areas of 96 square inches or
more should be protected by bars, grills, water filled traps or other structural means
providing equivalent protection to that portion of the perimeter barriers.
4. Clear Zones - an obstructed area or a “clear zone” should be maintained on both sides
of the perimeter barrier. A clear zone of 20 feet or more is desirable between the barrier
sand exterior structures and natural covers that may provide concealment for assistance
to a person seeking unauthorized entry
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim
a. Top Guard - additional overhang of barbed wire placed on vertical perimeter fences
upward and outward with a 45-degree angle with 3 to 4 strands of barbed wires spaced
6 inches apart. This increases the protective height and prevents easy access.
c. Tower Guard - this is a house-like structure above the perimeter barriers. The higher
the tower, the more visibility it provides. It gives a psychological unswerving effect to
violators. By and large guard towers, whether permanent or temporary, must have a
corresponding support force in the event of need. Towers as well as guard control stations
should have telephones, intercoms, and if possible two-way radios connected to security
headquarters or office to call for reserves in the event of need.
d. Barrier Maintenance - fencing barriers and protective walls should always be regularly
inspected by security. Any sign or attempts to break in should be reported for
investigation. Destruction offence or sections thereof should be repaired
immediately and guard vigilance should be increased.
f. Signs and notices - “Control signs” should be erected where necessary in the
management of unauthorized ingress to preclude accidental entry. Signs should be
plainly visible and legible from any approach and in an understood language or dialect