Download as pdf or txt
Download as pdf or txt
You are on page 1of 79

LESSON 1

INTRODUCTION TO SECURITY

TOPICS
1. Introduction
2. What is Security?
3. The Philosophy of Security
4. Security Motto
5. The primary duty of security personnel
6. International Security Principles
7. Principle of Security Management

LEARNING OUTCOMES
At the end of the lesson, you should be able to:
1. understand the methods and concepts of Security;
2. explain the definition of “security”;
3. discuss the philosophy and the primary duty of security personnel; and
4. list the international security principles and principle of security management.

TOPIC 1: Introduction

Security today covers different fields, business or industry; it may include the World
security, Nations security or even Human security. Security as a topic and subject is global,
national, and local in nature and scope. This is because the principle of security management is
universal in the application. Security is defined operationally as safety from harm or danger, a
term that has different dimensions in psychology, public safety, defense and military matters, and
information access. Security is crucial to any office or facility, but understanding how to get
started in this field can be difficult, to say the least. Even in small spaces, there can be dozens, if
not hundreds, of moving parts that can confuse even the most seasoned busi ness professional.
Deciding how to protect your business and its assets can be a process that seems nearly
impossible at first. But with the right tips and tricks, anyone can become an expert on physical
security; no matter how lost you might feel at first. You can make the most of your skills to
implement an effective plan and better protect your assets and data. Use this list to better
understand physical security and to implement its best practices into your space.

TOPIC 2: What is Security

What is Security?
Security is a state or quality, condition of being secured, freedom from fear, harm, danger,
loss, destruction or damages, to secure is to make safe or be protected.
 Freedom from fear or danger (protection) or defense against crime.
 Security is a condition of being protected against danger or loss.
 The subjective meaning of security as “freedom from anxiety or fear” resonates in the
origins of the word Latin “Se-Cura.”

Page 1 of 79
TOPIC 3: The Philosophy of Security

The essence of the existence of security in the business establishment, company or institution
is prevention. Prevention being the reason of their existence is always a primordial interest. Security
exists to prevent or avert any loss or damage to properties, loss of life and limbs and to some
extent, the prevention of crime. If something happens and we were not able to prevent the
happening, this is simply called the lapses of security.

TOPIC 4: Security Motto

The security motto is “VigilatutQuiescant” meaning “He watches that they may sleep”. The
essence of this motto still holds true today and could be considered an international motto not only for
the police but also for security personnel. The local motto being observed today by security personnel
is “observe and report” because it’s part of their basic function to report to the authorities or
management any observed illegal or legal activities in their areas.

TOPIC 5: The primary duty of security personnel

Security is synonymous to the word prevention. Prevention of crime is the primary reason of
the existence of a security forces in the industrial business and all other functions are inherent in order
to attain its existence in the business. The importance of security is the preventive and the proactive
mind set. Everyone must be vigilant even if high-tech gadgetry is available.

TOPIC 6: International Security Principles

The following are international security principles which are very important in security
management.
 The “need to know” principle
 Doctrine of least privilege
 Principle of defense in depth
 Target hardening
 Crime prevention through environmental design
 Crime proofing
 Courteous deterrent

TOPIC 7: Principle of Security Management

In the parlance of security management, the following are considered universal principles
which are considered basic foundation in security management. It is universal in the sense that the
application is applicable to the different industry, fields, system, and business. The following are the
basic principles of security management.
1. Security is everybody’s concern.
2. Security is good only as far as its weakest link.
3. No single security system or element can stand alone.
4. High relative security can be achieved in depth.
5. Each installation or establishment is different and unique.
6. What do you want to protect will determine the degree of protection?
7. Security measures could only be effective when enforced.

Page 2 of 79
8. The most effectiveness single component of any security program is security program is
security awareness of all employees.
9. Security is consistency through obscurity.
10. Security is preventive measure and counter measure.
11. Good security must start from the top with executives who help create corporate value of
security.
12. Security is a way of life.
13. There is no absolute security.
14. No two facilities have the same security needs.
15. Harm or danger may come from outside or inside of the facility.
16. There is no impenetrable barrier.

Page 3 of 79
Task/Activity

I - Identification: Identify the answer that corresponds to each question. Write your answers on the
space provided.

1. ___________________ The security motto is “VigilatutQuiescant” which means…


2. ___________________ It is synonymous to the word prevention.
3. ___________________ The essence of the existence of security in the business
establishment, company or institution is _______.
4. ___________________ If something happens and we were not able to prevent the happening,
this is simply called the _______.
5. ___________________ It is a state or quality, condition of being secured, freedom from fear,
harm, danger, loss, destruction or damages, to secure is to make safe or be protected.
6. ___________________ The subjective meaning of security as “freedom from anxiety or fear”
resonates in the origins of the word Latin called _______.
7. ___________________ It is the primary reason of the existence of a security forces in the
industrial business and all other functions are inherent in order to attain its existence in the
business.
8. ___________________ The essence of this motto still holds true today and could be
considered an international motto not only for the police but also for _________.
9. ___________________ It is a condition of being protected against danger or loss.
10. ___________________ The importance of security is the preventive and the _________.

II – Essay Writing: Discuss the following international security principles which are very important in
security management. (5 points each) see rubrics at page 75.

1. The “need to know” principle


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

2. Doctrine of least privilege


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

3. Principle of defense in depth


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

4. Target hardening

Page 4 of 79
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

5. Crime prevention through environmental design


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

6. Crime proofing
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

7. Courteous deterrent
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Page 5 of 79
LESSON 2
THE LEGAL BASES AND CONCEPTS OF SECURITY

TOPICS
1. The three legal bases of security management.
2. Factors that bring about unsecured conditions or situations.
3. The security functions cycle.
4. Components of Security Management.
5. Types of Control.

LEARNING OUTCOMES
At the end of the lesson, you should be able to:
1. identify the legal bases of security management;
2. familiarize with the factors and conditions or situations that may encounter in
the future.
3. familiarize with the functions to perform, the elements of crime and the different
measures to prevent crimes; and
4. understand the different types of control to assess the managing of people, the
facilities and to control access to information.

TOPIC 1: The three legal bases of security management

1. Natural Authority – The highest law is the law of self-preservation. By instinct man, man
naturally reacts in order protect himself, his family, his honor, freedom, liberty and property
from danger, threat or hazard. He does it personally or thru the help of others.

2. Constitutional Authority –
a. The prime duty of the Government is to serve and protect the people. The Government
may call upon the people to defend the state and, in the fulfilment thereof, all citizens
may be required, under conditions provided by law, or to render personal military
service. (Art. II Sec. 4 of the 1987 Philippine Constitution).
b. No person shall be deprived of life, liberty or property without due process of law, nor
shall any person be denied the equal protection of the law. (Art. III Sec. 1 of the 1987
Philippine Constitution).
c. Private property shall not be taken for public use without just compensation. (Art. III
Sec. 9 of the 1987 Philippine Constitution).
d. The right of the people to be secured in their persons, houses, papers, and effects
against unreasonable searches and seizure of whatever nature and for any purpose
shall be inviolable, and no search warrant or warrant of arrest shall be issued except
upon examination under oath or affirmation of the complainant and the witnesses he
may produce, and particularly describing the place to be searched and the persons or
things to be seized. (Art. III Sec. 2 of the 1987 Philippine Constitution).
3. Statutory Authority –
a. The Revised Penal Code (Act No. 3815, as amended)
b. R.A. No. 5487
c. P.D. No. 11 amending R.A No. 5487
d. P.D. No. 100 amending R.A No. 5487 & P.D. No. 11
e. P.D. No. 1919 amending R.A No. 5487 & P.D. No. 11 and 100

Page 6 of 79
f. R.A. No. 6975 (DILG LAW)- this is the law authorizing the PNP the control and
supervision of security agency in the Philippines.

TOPIC 2: Factors that bring about unsecured conditions or situations

The following are the different factors why security personnel in the industry have to plan and
prepare. The different terminology stated are the challenges that the security industry has to face
today. It is because of threat, hazard, risk and vulnerabilities that create the existence of security
management in the business or industry.
1. Threat – is activity that could lead to a loss.
2. Hazard – is a condition that could lead to a loss.
3. Risk – is a potential loss/damage to an asset.
4. Vulnerability – is a weakness that can be gained to an access to an asset.

TOPIC 3: The security functions cycle

To address the different stages of events and conditions the risk might bring about, the
personnel has specific functions to perform. The functions of the personnel are classified as to their
basic purpose, namely:
1. Preventive Functions – these functions are performed to address threats and deter or
prevent the risk from occurring.
2. Reactive Functions – these functions are performed to address emergency situations
when risks are occurring to prevent further loss or damage of resources.
3. Investigative Functions – these functions are performed w/ the following objectives:
a. To reconstruct the circumstances of a risk occurrence to possibly recover the loss.
b. To identify the person responsible and liable for the event and subsequent loss and
justify sanctions against the said person.
c. To find ways to prevent the recurrence of the loss.

With the adoption of the new preventive measures is another start of preventive stage of the
security functions cycle.

TOPIC 4: Components of Security Management

These are the following components of security management:


1. Preventive measures – are important tools and elements used in prevention of an incident
from happening.
2. Counter measures – are programs implemented to avoid repetition of the same event.

Crime prevention – is using instinct, common sense, and action to eliminate or greatly reduce
criminal’s opportunity. A large share of responsibility in reducing criminal opportunity lies in the
awareness, understanding and everybody’s commitment.

There are three elements that should be satisfied in order to complete commission of crime or
other called “Triad of Crime”, they are:
 Desire
 Opportunity
 Ability
Eliminate one of these elements and no crime will happen. Practically, in crime prevention you
have no control over the first two elements because it remains in the imagination of the person with
interest. However, you can have great control in the commission of crime if you eliminate Opportunity,
which is the very essence of crime prevention effort.

Page 7 of 79
Triangular Functions of Law Enforcement: it is important to note that proactive measures
and reactive measures are totally different from countermeasures, although they have similar
objectives. Proactive measures are designed to prevent crime from happening while
countermeasures are designed to prevent a crime from happening again. Reactive measures will
come into play to point out what was wrong? What was the problem? Identify the criminal and solve the
crime.

TOPIC 5: Types of Control

1. Administrative controls – consists of approved written policies, procedures, standards and


guidelines. Administrative control forms the framework for running the business and managing
people. They inform people on how the business is to be run and how day to day operations
are to be conducted.
2. Logical Controls (also called technical control) use of software and data to monitor and control
access to information and computing systems.
(e.g. passwords, network and host based firewalls, network intrusion detection system. Access
control lists, and data encryption and logical control.
3. Physical controls – monitor and control the environment of the work place and computing
facilities. They also monitor and control access to and from such facilities.
(e.g. doors, locks, heating and air conditioning, smoke and fire alarms, fire suppression
system, cameras, barricades, fencing, security, guards, cable locks, etc.)

Identification is an assertion of who someone is or what something is.

Authentication is the act of verifying a claim of identity. For example, when Dr. Joseph Borres
goes into a bank to make a withdrawal, he tells the bank teller he is Dr. Borres (a claim of identity). The
bank teller asks to see a photo ID, so he hands the teller his driver’s license. The bank teller checks the
license to make sure it has Dr. Borres printed on it and compares the photograph on the license
against the person claiming to be Dr. Borres. If the photo and name match the person, then the teller
has authenticated that Dr. Borres is who he claimed to be.

There are three different types of information that can be used for authentication:
 Something you know – (e.g. include such things as a PIN, a password, or your
mothers’ maiden name).
 Something you have – (e.g. include a driver’s license or a magnetic swipe card).
 Something you are – refers to biometrics. (e.g. includes palm prints, finger prints, voice
prints, and retina (eye) scans.
System
- a set of things of working together as parts of a mechanism or an interconnecting network.
- A set of principles or procedures according to which something is done; an organized scheme
or method.

Strong authentication requires providing information from two of the three different types of
authentication information. For example, something you know plus something you have. This is called
two factor authentications. On computer systems in use today, the username is the most common
form of authentication. Usernames and passwords have served their purpose but in our modern world
they are no longer adequate. Usernames and passwords are slowly being replaced with more
sophisticated authentication mechanism.

Page 8 of 79
Task/Activity

I - Identification: Identify the answer that corresponds to each question. Write your answers on the
space provided.
1. ________________ It is the highest law is the law of self-preservation. By instinct man, man naturally
reacts in order protect himself, his family, his honor, freedom, liberty and property from danger, threat
or hazard. He does it personally or thru the help of others.
2. ________________ (it is also called technical control) use of software and data to monitor and
control access to information and computing systems.
3. ________________ is using instinct, common sense, and action to eliminate or greatly reduce
criminal’s opportunity. A large share of responsibility in reducing criminal opportunity lies in the
awareness, understanding and everybody’s commitment.
4. ________________ it consists of approved written policies, procedures, standards and guidelines.
5. ________________ are designed to prevent crime from happening.
6. ________________ it will come into play to point out what was wrong? What was the problem?
Identify the criminal and solve the crime.
7. ________________ is the act of verifying a claim of identity.
8. ________________ are designed to prevent a crime from happening again.
9. ________________ are important tools and elements used in prevention of an incident from
happening.
10. ________________ these functions are performed to address emergency situations when
risks are occurring to prevent further loss or damage of resources.

II – Essay: Explain the following (5 points each). See rubrics at page 75.
1. What is the most practical and generally accepted system of personnel identification? And how
these security personnel eliminate the risk of allowing the access of unauthorized personnel
within the establishments?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

2. What is the use of pass system?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

3. What do you think the proper methods of establishing the authority for admission of visitors as
well as the limitation thereat?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Page 9 of 79
4. What must be the established system for the control of package entering or leaving the
premises?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

5. What must be the system for the vehicle movement control within the boundaries of any
facility?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

6. Why it is important to limits someone to enter in a building?


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Page 10 of 79
LESSON 3
MEASURES, CONCEPT OF PHYSICAL SECURITY

TOPICS
1. Measures taken to safeguard personnel from harm and to protect property from
loss.
2. Concept of 5 Ds.
3. Role of Security Officer.
4. Duties of Security Manager.

LEARNING OUTCOMES
At the end of the lesson, you should be able to:
1. identify the measures and concept of physical security;
2. determine the role of security officer; and
3. familiarize with the duties of a security manager in physical security.

TOPIC 1: Measures taken to safeguard personnel from harm and to


protect property from loss

Measures taken to safeguard personnel from harm and to protect property from loss. They are:
 Deterrence – is a method to convince potential attackers that a successful attack is unlikely
due to strong defenses. The initial layer of security for a campus, building, office or other
physical space uses crime prevention through environmental design to deter threats.
 Intrusion detection – access control and intrusion detection is a unified system that allows
users to monitor and control physical access to certain areas. This form of protection can
extend to physical properties and into cybersecurity.
 Security guards – every business premises or residential property is different and sometimes
the personal touch for security is much more appropriate, particularly for businesses which
require a front- of – house assistance role, such as serviced apartments or office spaces.
Needing this personal touch doesn’t mean having to go without the additional security benefits
of technology though, as guard based security systems can be easily linked to additional
monitoring and guard teams. Additionally, guards can be responsive to other issues that CCTV
or remote surveillance may not pick-up, such as utility, gas or chemical leaks, weather damage
such as storms and flood damage or fly tipping in blind spots on larger sites. It’s easy to avoid
blind spots altogether by ensuring that guards patrol all sections of a site, rather than relying on
surveillance with limited coverage. Having physical guards also brings the additional benefits
of:
a. Providing a highly visual deterrent;
b. Generating less false alarms, as issues can be directly investigated;
c. Offering the potential for reducing overall costs by doubling up guard personnel with other
required services such as management services;
d. Offering real-time and on-site surveillance of CCTV, where both systems are used;
e. Providing a more multi-sensory response, as guards may hear break-ins occur long before
evidence can be seen via CCTV;
f. Enhanced security with the addition of guard dogs.

Page 11 of 79
 Access control - It is a security measure put in place to monitor the movement of persons and
materials (company property) at the gate. Staff are required to wear ID cards while entering the
premises. Visitors are processed in by contacting the hosts before granting access and their
names logged on the Visitors Notebook. On their way out, they sign out. The same procedure
applies to vendors on business visits. Materials are allowed out of the premises if they are
covered by a gate pass duly signed by authorized persons. Waybills of materials brought in by
vendors are recorded on a haulage notebook by security men at the gate. The boots of
vehicles exiting the premises are searched by security men. The reason for access control is to
prevent people who have no business in the premises from entry. It also prevents theft of
company or staff property.

TOPIC 2: Concept of 5 Ds

Physical security focuses on the concept of 5 Ds


 Deter – barriers to discourage intruders
 Deny - barriers to prevent an attempt
 Delay – barriers to increase intruder’s effort
 Detect- equipment to reveal intruder’s presence
 Defend- measures put in place to respond to intrusion

TOPIC 3: Role of Security Officer

Role of a Security Officer


 Engaging regularly in dialogue with the executives of the host community so that issues
affecting the community could be resolved amicably without disruption of company operations.
 Gathering intelligence (security information) from the locals and cascading same to appropriate
authority for action
 Training the guards regularly on what to do while on duty in their respective beats
 Arranging escorts for VIPs
 Liaising with Government Security Agencies: NPF, Army.
 Reporting Security situation to CSO or security manager on daily basis
 Interfacing between company staff and Gov’t Security Forces
 Investigating and writing reports on crimes committed in the facility
 Conducting Risk Assessment periodically and addressing loopholes.
 Ensuring that access control policies are religiously complied with
 Visiting the guards regularly to ensure that they don’t leave their beats

TOPIC 4: Duties of Security Manager

Duties of a Security Manager


1) To provide effective leadership to the security teams in the base office and field operations.
2) Prepare the annual security budget and work on monthly, quarterly reviews of budget performance
for the department.
3) Serve as a focal point for any investigation relating to company security matters.
4) Initiate and sustain good working relationships with GSF and host community leaders.
5) Identify actual and potential threats to staff & their families and address them.
6) Ensure that all security staff are trained appropriately on all levels of security procedures.

Page 12 of 79
Task/Activity

I - Identification: Identify the answer that corresponds to each question. Write your answers on the
space provided.

1. _____________________ It is a security measure put in place to monitor the movement of persons


and materials (company property) at the gate.
2. _____________________ in every business premises or residential property is different and
sometimes the personal touch for security is much more appropriate, particularly for businesses
which require a front- of – house assistance role, such as serviced apartments or office spaces.
3. _____________________ is a method to convince potential attackers that a successful attack is
unlikely due to strong defenses.
4. _____________________ it is a access control and intrusion detection is a unified system that
allows users to monitor and control physical access to certain areas.
5. _____________________ are required to wear ID cards while entering the premises.
6. _____________________ are processed in by contacting the hosts before granting access and
their names logged on the Visitors Notebook.
7. _____________________ are allowed out of the premises if they are covered by a gate pass duly
signed by authorized persons.
8. _____________________ providing a more multi-sensory response, as guards may hear break-ins
occur long before evidence can be seen via __________.
9. _____________________ enhanced security with the addition of guard ______.
10. _____________________ it is the initial layer of security for a campus, building, office or other
physical space uses crime prevention through environmental design to deter threats.

II – Essay: Explain the following (10 points each). See rubrics at page 75.

1. What is the difference between the active perimeter entrances and exits and the inactive or limited
active gates?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2. What is the importance of using sentry dogs for primary security?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Page 13 of 79
LESSON 4
DEFENSE IN-DEPTH

TOPICS
1. Security-in-depth
2. Risk Management Process
3. The three lines of physical defense
4. Perimeter Barrier
5. Different types of Perimeter Barrier
6. Perimeter Barrier Opening
7. Specifications on clear zones and windows
8. Additional protective measures
9. Guard and Guard System
10. Minimum Acceptable Requirements for Fence used as Security Barrier
11. Two outstanding energy barriers
12. Purposes and Types of Protective Lighting
13. Line Supervision for Security Alarms
14. Three Basic Parts of Alarm System
15. Types of Protective Alarm System
16. Kinds of Alarm
17. Protective Locks and Key Control
18. Security communications
19. Fiber optic technology
20. Methods of Wire Transmission
21. Types of Alarm Detection
22. IDS System

LEARNING OUTCOMES
At the end of the lesson, you should be able to:
1. identify the different physical security measures applied in a facility
consists of layered and complementary security controls sufficient to
deter, detect, and document unauthorized entry and movement within the
facility;
2. identify the plan and implement effective physical security measures in
the risk management process to determine where and how to allocate
your security resources;
3. identify the security mechanisms and strategies uses to protect the
perimeter of a facility;
4. identify the appropriate physical mechanisms to implement in a given
scenario;
5. examine the functions of security areas and describe the successful use
of security lighting, security alarms, and protective locks and key control;
6. familiarize with the use of fiber optic technology, methods of wire
transmission and the IDS system.

Page 14 of 79
TOPIC 1: Security-in-Depth

The protection of national security and other Department of Defense (DoD) assets is
accomplished through the application of active and passive complementary security controls. This
integration of physical security measures is also known as security-in-depth. Security-in-depth is a
determination by the senior agency official that a facility’s security program consists of layered and
complementary security controls sufficient to deter, detect, and document unauthorized entry and
movement within the facility. This is accomplished through the integration of active and passive
complementary physical security measures. The best way to describe how security-in-depth works is to
think of an onion and all the layers it takes to get through to the center. As you begin to peel an onion, it
takes more of an effort to reach the center. Let’s take a government facility and add barriers and guard
posts with guards in them. Next, add a fence around the perimeter along with bright lights and
appropriate signs. The government building inside the fence also employs security measures, as there
will be guards and security screening equipment one must walk through to get into the building. Can
you see the layers of security and how each one is a deterrent? If someone is able to penetrate any
one of these layers of security, it will take them time and energy to get through to the next layer. That
time is what enables our security to defend and protect our national security and DoD assets. Security
requirements for classified contracts are stated in Department of Defense (DoD) 5220.22M, the
National Industrial Security Program Operating Manual (NISPOM). Any additional security
requirements levied upon a contractor must be specifically addressed in the contract.

Points vs. Area Security - Two applications of physical security are point security and area
security. Point security is exactly how it sounds. If you are assigned to point security, you are guarding
a specific asset or resource. A good example of point security is the original Constitution of the United
States of America. There are guards standing directly in the space of the constitution. On our military
installations or secure federal buildings, entry, and exit locations are often guarded. This is also an
example of point security. Now that you know what point security means, what do you think area
security might mean? Area security protects an entire area of the installation or facility. The goal of
area security is to try and consolidate as many assets as possible into one area. This is to intensify the
protection efforts while maximizing the effectiveness of response forces. It is important to remember
that security professionals employ both point and area security to protect national security and other
DoD assets from damage, loss, and theft.

TOPIC 2: Risk Management Process

In order to plan and implement effective physical security measures, you must use the risk
management process to determine where and how to allocate your security resources. The steps in the
risk management process are:
• Identify assets
• Identify threats
• Identify vulnerabilities
• Conduct risk analysis
• Determine countermeasure options
• Make risk management decisions

Let’s take a look at each step in the risk management process to learn more.

Identify Assets - Properly designed and executed physical security programs should deter or prevent,
to the greatest degree possible, the loss of, theft of, or damage to an asset. DoD assets include people,
information, equipment, facilities, activities, and operations. Combined, these assets are referred to as
PIE-FAO. When identifying and assessing an asset, you must determine the nature and value of that
asset and the degree of impact if the asset is damaged or lost.

Identify Threats - After identifying assets you must identify and assess the threats to those assets. A
threat is the perceived imminence of intended aggression by a capable entity to harm a nation, a

Page 15 of 79
government, or its instrumentalities, such as intelligence, programs, operations, people, installations, or
facilities. A threat can be an indication, circumstance, or event with the potential to cause loss of, or
damage to, an asset or capability. Examples of threats include threats from the Foreign Intelligence
agents, terrorist organizations, foreign military or paramilitary forces, criminal activities, civil
disturbances, insider threats, environmental threats, and cyber threats.

NOTE: The information below will not be on the test but is included here as additional information that
may provide useful background and insight.

Threat: The perceived imminence of intended aggression by a capable entity to harm a nation, a
government, or its instrumentalities

Foreign Intelligence Agents: Adversaries acting in the interest of a foreign intelligence entity that
actively engages in intelligence activities against the U.S. or its assets

Terrorists/Saboteurs: Adversaries who use violence or the threat of violence to instill fear with the intent
to coerce or intimidate governments or societies in the pursuit of goals that are generally political,
religious, or ideological

Foreign Military/Paramilitary Forces: Terrorist groups develop organizational structures that are
functional for the environment in which they operate, such as cellular and paramilitary. Terrorist
organizations are military in nature, with a set chain of command. There are four elements in this
structure: leaders, active cadre, active supporters, and passive supporters.

Criminals: Adversaries who commit crimes against people or property such as assault, theft, or hacking
into computer systems
Civil Disturbances: Civil disturbances most often arise from political grievances, urban economic
conflicts, community unrest, terrorist acts, or foreign influences. They can range from peaceful
picketing to full-blown riot situations.

Insider Threats: Trusted persons who have been granted access to DoD resources or services

Environmental Threats: Natural phenomena/disasters that have the potential to damage DoD
resources or services or interrupt activities or operations

Cyber Threats: Attacks on DoD computer systems and the information contained in those systems.

Identify Vulnerabilities - After you have identified the assets and threats, you must identify the
vulnerabilities and determine their extent.

Vulnerabilities are weaknesses, characteristics, or circumstances that can be exploited by an adversary


to gain access to or information from an asset. If not addressed, vulnerabilities may result in the
degradation, loss of life, or damage to mission-essential resources. Vulnerabilities can be the result of
a variety of factors, such as the way a building was constructed, location of people and equipment,
operational practices, and even personal behavior.

NOTE: The information below will not be on the test but is included here as additional information that
may provide useful background and insight.

Vulnerabilities: Situations or circumstances that, if left unchanged, may result in the degradation, loss
of life, or damage to mission-essential resources

Conduct Risk Analysis - Once you have identified the assets, threats, and vulnerabilities, you must
then conduct a risk analysis based on both the impact of an unwanted event and the likelihood that it
could happen. Think about the impact if your assets were compromised and the likelihood of a
compromise happening, such as loss of strategic or military advantage, or even loss of life.

Page 16 of 79
Determine Countermeasure Options - Once you’ve calculated the risks, you must determine which
countermeasures you might employ to protect DoD assets by reducing vulnerabilities and mitigating
threats. Countermeasures include security measures that you employ in up-front facility design, in the
day-to-day protection of DoD assets, and in times when threat levels increase.

Make Risk Management Decisions - Once you’ve determined your countermeasure options, you
must make risk management decisions based on the cost versus the benefit of protecting DoD assets.

TOPIC 3: The three lines of physical defense

Defense In-depth - It is generally accepted that there are three lines of physical defense:

1. The outer perimeter barriers located at the outer edge of the property referred to as the first line of
defense.
2. The exterior walls, ceilings, roof, and floors of the building the second line.
3. Temporary, or partitioned areas within the building known as the third line of defense.

TOPIC 4: Perimeter Barrier

What is Barrier?

Barriers- it refers to any physical structure whether natural or man-made capable or


restricting, deterring, delaying or preventing illegal and unauthorized access to an installation.

Purpose: The purpose of protective barriers in safeguarding the areas, building, and the proper
utilization of lighting at night have contributed to modern man’s attempt to discourage intruder, pilfer,
and other entrant’s devious intent.

Kinds of Barrier:

1. Natural Barrier- it includes bodies of waters, mountains, marshes, ravines, desserts or other terrain
that are difficult to traverse.
2. Structural Barrier- these are features constructed by man regardless of their original intent that tends
to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or
containers etc.
3. Human Barrier- persons being used in providing a guarding system or by the nature of their
employment and location, fulfill security functions. Examples are guards, office personnel, shop
workers, etc.
4. Animal Barrier- animals are used in partially providing a guarding system. Dogs are usually trained
and utilized to serve as guard dogs. German shepherds are best suited for security functions.
Goose and turkeys could also be included.
5. Energy Barrier- It is the employment of mechanical, electrical, electronic energy imposes a deterrent
to entry by the potential intruder or to provide warning to guard personnel. These are protective
lighting, alarm system and any electronic devices used as barriers.

Two General Types of Physical Barrier:


1. Natural Barrier- such as rivers, cliffs, and ravines, etc. which delay or make more difficult the entry of
the intruder.
2. Man-made Barrier- are structural construction like fences walls, floors, roofs, grills, bars, road blocks,
or other physical means to deter or impede penetration.

Generally, a barrier is used for the following purposes:


1. Outline the physical limits of an area.
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards.

Page 17 of 79
5. Facilitate and improve the control and vehicular traffic.

Barriers serve three basic functions:


o Delay
o Psychological deterrent
o Supplement and/or compliment the on-site security personnel needs

Positive barriers should be set up to:


 Control vehicle and pedestrian traffic
 Enable identification of people arriving and departing
 Provide a buffer zone for more sensitive areas of the company

Security Barriers- creating protective barriers incorporates three concepts of prevention.


 First, you want to prevent people from entering company property except in those areas
managed and controlled by security personnel.
 Second, you want to prevent people from leaving the company premises except through the
same control points.
 Third, you need to prevent people from having access to certain buildings, places, and areas
within the company property. You can achieve that goal with a system of barriers, in layers,
some obvious and others not

Perimeter Barrier – a medium or structure which defines the physical limits of an installation or area to
restrict or impede access thereto. It is any physical barrier used to supplement the protection of an
inside or outside perimeter. The main purpose of perimeter barrier is to deny or impede access or exit
of unauthorized person. Basically, it is the first line of defense of an installation. This is maybe in the
form of fences, building walls or even bodies of water. The function and location of the facility itself
usually determine the perimeter of the installation.

General Purpose of Perimeter barriers


 Defines the boundary of the property to be secured
 Creates a physical and psychological deterrent to unauthorized entry
 Delays intrusion, thus facilitating apprehension of intruders
 Assists in a more efficient and economical employment of guards
 Facilitates and improves the control of pedestrian and vehicular traffic

Classifications of Barrier:
1. Inside Perimeter – a line adjacent to protected area, and passing through points of possible entry
into the area, such as doors, windows, skylights, tunnel or other points of access.
2. Outside Perimeter – a line of protection surroundings but somewhat removed from a protected
area, such as a fence.

TOPIC 5: Different types of Perimeter Barrier

 Types of Perimeter Barrier:


1. Wire Fences
2. Walls
3. Bodies of Water

A. Wire Fence – can be barbed wire, chain link or concertina. Chain link are for permanent structure,
barbed wire is for semi-permanent, and concertina for the least permanent and also can be used as a
temporary road block or impediment during strikes and crowd control. Wire fences are attractive and
low in maintenance cost; they offer less hazard to people because of the absence of barbs, and the
openings are small to prevent passage of pilfered article.

Page 18 of 79
Types of Fence:

1. Solid Fence – constructed in such a way that visual access through the fence is denied. Its
advantage is that it denies the opportunity for the intruder to become familiar with the
personnel, activities and the time scheduled of the movements of the guards in the
installation.

Advantage of Solid Fence:


a. Denies visual access of the installation to the intruders.
b. Denies the intruder the opportunity to become familiar with the personnel, activities, and
time scheduled of the movement of the guards on the installation.

Disadvantages of Solid Fence:


a. It prevents the installation guards from observing the area around the installation.
b. A solid fence creates shadows which may be used by the intruder for cover and
concealment.

2. Full-View Fence – It is constructed in such a way that visual access is permitted through
the fence. Its advantages are that it allows the roving patrols and stationary guard to keep
the surrounding area of the installation under observation.

Advantages of Full-View Fence:


a. Roving patrols and stationary guards are able to keep the area surrounding the installation
under observation.
b. It does not create shadows which would provide cover and concealment for the intruder.

Disadvantages of Full-View Fence:


a. It’s allowing visual access to the installation, its personnel, its guards; and its activities.
b. It allows the intruder to become familiar with the movements and the time schedule of the
guard’s patrol; there after allowing him to pick the time for attempting penetration which
would be most advantageous to him.

Types of Full-View Fence:

A. Chain Link Fence:


1. It must be constructed of 7 feet material
excluding top guard.
2. It must be of 9 gauges or heavier.
3. The mesh openings are not to be larger
than 2 inches per side.
4. It should be twisted and barbed salvage at
top and bottom.
5. It must be securely fastened to rigid metal
or reinforced concrete.
6. It must reach within 2 inches of hard ground
or paving.
7. On soft ground, it must reach below surface
deep enough to compensate for shifting
soil or sand.

A major advantage of Chain Link fencing is that it provides good visibility from both sides, for
both guards and police patrols.

The disadvantages are that it creates an institution- like appearance to the organization.

Page 19 of 79
B. Barbed Wire Fence:
1. Standard barbed wire is twisted, double-
strand, 12-gauge wire with 4 point barbs
spaces on equal distance apart.
2. Barbed wire fencing should not be less
than 7 feet high excluding top guard.
3. Barbed wire fencing must be firmly affixed
to post high excluding top guard.
4. The distance between strands will not
exceed 6 inches and midway between
parts.

C. Concertina Wire Fence:


1. Standard concertina barbed wire is
commercially manufactured wire coil of
high strength steel barbed wire clipped
together at intervals to form a cylinder.
2. Opened concertina wire is 50 feet long and
3 feet in diameter.

Other types of Fence or Wall Mounted


a. Vibration detectors
b. Inertia detectors
c. Micro phonic
d. Capacitance(E-field)
e. Fiber Optic

Buried Sensors
a. Leaky Cable
b. Balanced pressure system
c. Capacitance
d. Acoustic
e. Fiber Optics

B. Building Wall – walls, floors, roof or their combination serve also as barriers and they should be of
such construction to provide uniform protection just like the wire fencing. Masonry walls as perimeter
barrier should have the same heights as the chain link and surmounted by the barbed wire top guards;
if the height of the masonry is less than the prescribed, additional chain link as “topping”.
Wall can be made of stone slabs like adobe or hollow bound by concrete with post at regular intervals
to prevent the wall from toppling due to wind, or scouring facilities, security must sit down with design
engineers so that area where sensitive activity will be done should be given special emphasis in
protective walls.

C. Bodies of Water – bodies of water like river, lake, marsh, cataract, sea pond or any other bodies of
water forming a part of the wall, building or fencing should never be considered adequate natural
perimeter barrier. Additional security measures like wire fence, concrete walling, security patrolling and
floodlighting at night may be necessary for the portions of the perimeter.

Page 20 of 79
TOPIC 6: Perimeter Barrier Opening

Perimeter Barrier Opening:

1. Gates and Doors


2. Side-walk-elevators
3. Clear Zones

TOPIC 7: Specifications on clear zones and windows

Specifications on clear zones:


a. Clear zones of 20 feet or more
should exist between the perimeter
barriers and exterior structure,
parking areas and natural or man-
made features.
b. A clear zone of 50 feet or more
should exist between the perimeter
barrier and structure within the
protected areas except when a
building wall constitutes part of the
perimeter barrier.

Security Specification for


windows or opening:

Windows or opening less than 18 feet above ground, roof, ledges, etc. or less than 14 feet
directly or diagonally, opposite uncontrolled windows in other walls, fire, escapes or other opening of 96
square inches or larger should be grilled or have steel bar protections.

TOPIC 8: Additional protective measures

Additional Protective Measures:

2. Guard Control Stations


3. Tower Guard
4. Barrier Maintenance
5. Protective in Depth
6. Signs and notices

Page 21 of 79
TOPIC 9: Guard and Guard System

Guard and Guard System:


A. Function that must be accomplished by this guard system:
1. Detect intruders;
2. Sound Alarm;
3. Apprehend unauthorized personnel; and
4. Identify authorized personnel.
B. Human Barriers:
1. Guard Procurement: Selection criteria:
a. Must eligible for security clearance;
b. Vigorous and physically able to serve in the capacity of a guard;
c. Intelligence necessary to accomplished the guard function;
d. The ability to make rapid decisions and react in a calm way to emergencies;
e. Loyalty and discretion are required attributes; and
f. Experience is highly desirable although not usually mandatory.
2. Guard Training: Programs of training should include:
a. General Orientation
b. Instruction in security procedures of the installation, first aid, and communication
c. Instruction in traffic control, riot control, self defense.
d. Weapons qualifications to include maintenance and safety.
e. Refresher course and advance training in specific subjects.
3. Guard employment: Two basic techniques of guard employment:
a. Fixed post
b. Patrols
4. Guard supervision:
a. Personal supervision: Personal inspection of all guards prior to their starting tour of duty.
Periodic checks of guards during their tour by the senior member of each relief or his
representative.
b. Artificial supervision:
1. Recorded tour- guard takes with him on his tour of duty a form which must have the time
punched on it at each station.
2. Supervisory tour- this is where the guard sends signals to guard headquarters from each
station that he checks.
5. Guard communication:
a. Primary Communication- direct line telephone or in some instance radio.
b. Emergency Communication- ex. Messengers

TOPIC 10: Minimum Acceptable Requirements for Fence used as


Security Barrier

Minimum Acceptable Requirements for Fence used as Security Barrier:

a. Height- eight feet at minimum


b. Slack at the bottom- not to exceed two inches, if the fence is not taut then it should extend even
closer to the ground.
c. Wooden fence post- minimum horizontal dimension of four inches by the four inches.
d. Steel fence post- the round type should be at least two inches in diameter and the height beam type
must measurable no less than two inches at the smallest diameter.
e. Fence posts- fence post should be set in concrete or in firm soil using commercial drive anchors, to a
depth of three feet; maximum distance between posts is ten feet.
f. Fence top- there should be something on the top of the fence to deter persons attempting to go over
the fence good example would be the use of barbed wire overhang, holding the stands of barbed
wire should be two feet long and should be extended at 45-degree angle in the direction of the
expected approach.

Page 22 of 79
g. Fence area- the area surrounding the fence should be clear of trees and vegetation and debris or
other materials which offer concealment to the intruder or would aid him in scaling.
h. Fence Gate- gates should be limited to the number necessary for efficient and safe operation of the
installation.
i. Fence opening- all opening in the fence in excess of 96 inches must be lock, barred, or screened in
such a way that they may only be unlocked and opened from the inside and only by selected
personnel.
j. Multiple fence- if used, multiple fence should be at least ten feet apart and the overhang on the top of
the inner fence should point inward rather than away from the installation maximum distance any
two parallel fences should not exceed 150 feet.

TOPIC 11: Two outstanding energy barriers

In counter intelligence security consideration there are two outstanding energy barriers:
a. Protective lighting- The idea that lighting can provide improve protection for people and
facilities is as old as civilization. It is the single most cos-effective deterrent to crime because
it creates a psychological deterrent to the intruders.
b. Protective Alarms- it assists the security in detecting, impeding or deterring potential security
threat in the installation. Basically, its function is to alert the security personnel for any attempt
of intrusion into a protected area, building or compound.

TOPIC 12: Purposes and Types of Protective Lighting

Purposes of Protective Lighting


1. It provides sufficient illumination to the areas during hours of darkness.
2. Lighting can help improve visibility so that intruder can be seen and identified and, if possible,
apprehended.
3. It serves as deterrent to would-be thieves.

Types of Protective Lighting


1. Continuous Lighting
a. Glare projection type
b. Controlled lighting
2. Standby lighting
3. Movable or Portable lighting
4. Emergency lighting

General Types of Lighting Source


1. Incandescent Lamp
2. Mercury Vapor Lamp
3. Metal halide
4. Fluorescent
5. High pressure sodium vapor

Types of Lighting Equipment


1. Floodlights
2. Street lights
3. Search lights
4. Fresnel lights

Protective Lighting - provides a means of


continuing, during the hours of darkness, a
degree of protection maintained during daylight www.protectivelighting.com
hours.

Page 23 of 79
The importance is three fold:
a. It serves as a deterrent to intruders
b. It assists the security force
c. It serves as an essential element of an integrated physical security programmed.

The general characteristics of protective lighting are:


a. It is relatively inexpensive to maintain
b. It will probably reduce the number of security forces personnel,
c. It provides protection for them by reducing the element of surprise by the intruder.
d. It requires less intensity than working light.

Planning considerations for installation & maintenance of protective lighting:


1. Consider the effects of the local weather conditions.
2. Fluctuation of voltage in the power source.
3. Standby power source capable of maintaining the desired level of lighting, particularly in all vital
areas.
4. Establish a ledger to maintain a burning time record based on the life expectancy of the lamp.

Limited and Exclusion Area Needs:

1. These areas must have protective lighting on a permanent basis during the hours of darkness, at
both the perimeter and access control points.
2. The wiring circuit should be such that the failure of one or more lights should not affect the operation
of the remaining lights.
3. The control for such lighting should be by security.
4. The lighting must be positioned so as to prevent glare or silhouetting the security staff.
5. The cone of light should be directed downward and away from structures or the areas protected, and
away from security personnel assigned to such protection.
6. At perimeter barriers the lighting should be located sufficiently within the protected area and above
the fence so that the light pattern will cover a ground area.
7. Light levels recommended for these areas are:
a. 0.2 foot-candles, measured horizontally at 6” above ground and outward from the area perimeter
barrier to at least 30’
b. The lighting level inside the exclusion area, and on structures containing nuclear weapons, must
be sufficient to detect persons in the area or at entrances to any structures.
c. Levels at access control points should be sufficient to enable comparison of ID cards with the
holder.
d. Protective lighting should never be relied on alone but should be used with other security
measures.

General Principles of Protective Lighting


Protective lighting should enable security staff to see without being seen, with adequate and
even levels of light over bordering areas, where possible directed to glare in the eyes of the intruder,
and with little light on actual patrol routes. To be effective, protective lighting should act as deterrent
making detection likely.

Definition of terms:

Continuous - is the most common protective lighting, consisting of stationary luminaries, and is
generally employed for glare projection and control lighting.
Standby - Luminaries are stationary, but are not continuously lit.
Moveable - Consists of manually operated movable search light which may be lit during darkness or as
necessary, and they are usually used to supplement ’Standby’ or ‘Continuous’ lighting.
Emergency - The system may duplicate any of the other three (3) systems in whole or part, and use
generally limited to times of power failure or other emergencies, as they rely on
alternative power sources such as portable generator s or batteries.

Page 24 of 79
Piers and Docks
 They should be protected by lighting both on water approaches and at the pier area.
 Decks on open piers should be lit to at least 1.0 foot-candles. Water approaches, extending to
a distance of 100’ from the pier should be lit to at least 0.5 foot-candles.

Wiring Systems
 Circuits should be arranged so that the failure of any one lamp will not leave a critical or
vulnerable position in darkness.
 Feeder lines should be located underground (or sufficiently inside the perimeter in case of
overhead wiring) to minimize sabotage or vandalism from outside the perimeter.
 Periodic maintenance inspections should be made of all electrical circuits to replace or
repair worn parts.

Definition of terms:

a. Candle Power - One candle power is the amount of light emitted by one standard candle.
b. Lumen - One lumen is the amount of light required to light an area of one square foot to one candle
power.
c. Foot Candle - One foot-candle equals one lumen of light per square foot of space. The intensity of
illumination is measured in foot- candles.
d. 1 lux = 10ft. Candles

Types of Lighting Used for Protective Purposes

Incandescent- A common light bulb, provides instant light on power up, and can be manufactured
such that light can be reflected or diffused.

Gaseous Discharge Lamps - There are two main types.


• Mercury Vapour (soft blue-white light)
• Sodium Vapour (gives soft yellow light)

The main disadvantages of gaseous discharge lights are that they take between 2-5 minutes to light
(warm-up) and even longer when already hot, i.e. after a power failure- this is called the ‘restrike time’.
The advantages are that they are much more efficient than incandescent lamps, widely used where fog
is a problem and frequently found on a bridges and highways.

Quartz lamps - They emit a very bright light almost instantaneously when powered up.

Page 25 of 79
They are excellent for use along perimeters and in critical areas, and are frequently used at
very high wattage (500-1000 watt), therefore more costly to run and they are more costly to replace.
The individual life expectancy is also much lower than the other two types, although the initial purchase
and installation cost is the cheaper of the types covered here.

Definition of terms:

• Floodlights - Directional, with some diffusion to light specific areas.


• Searchlights - Lights that project light in a concentrated beam, and can be used as initial response to
perimeter area intrusion incidents.
• Fresnels - Wide beam units used to extend the illumination in long horizontal strips. They project a
narrow beam approximately 180 degrees’ horizontal and 15 to 30 degrees vertical. On perimeter little
vertical light is lost.
• Street Lights – Used in parking areas and top-up applications and produced diffused light.

TOPIC 13: Line Supervision for Security Alarms

Line Supervision is very important, as it is the weakest link in IDS system. Line needs tamper
detection. Methods of supervision are:
a. dedicated lines
b. proprietary lines
Line should always be buried when it goes outside of building, and inside should always be inside
conduit. The line circuits should be able to be checked automatically by the system.

Alarm- is an aural or visual signal given by the annunciator to security when intruder actuates device in
a protected area. An annunciator is a visual or audible signaling device which initiates conditions of
associated circuits. Basically alarm systems are designed to alert security personnel to consummated
or attempted intrusions into an area, building or compound. Each type of alarm is activities in the event
that an intruder tempers with the circuitry, a beam or radiated waves. Intrusion alarm can be electrical,
mechanical or electronics. Alarms are also used for fire, smoke or other emergencies and presence of
other hazards.

TOPIC 14: Three Basic Parts of Alarm System

1. Sensor or Trigger device- it emits the aural or visual signals or both.


2. Transmission line- a circuit which transmit the message to the signaling apparatus.
3. Enunciator- it is the signaling system that activates the alarm.

TOPIC 15: Types of Protective Alarm System

1. Central Station System- a type of alarm where the control station is located outside the plant or
installation.
2. Proprietary system- centralized monitor of the proprietary alarm system is located in the industrial
firm itself with a duty operator.
3. Local Alarm- this system consists of ringing up a visual or audible alarm near the object to be
protected.
4. Auxiliary alarm- company-owned alarm systems with a unit in the nearest police station so that in
case of need, direct call is possible.
5. Local Alarm by chance system- this is local alarm system in which a bell or siren is sounded with no
predictable response.
6. Dial alarm system- this system is set to dial a predetermined number or numbers when the alarm
activates.

Page 26 of 79
TOPIC 16: Kinds of Alarm

1. Audio Detection Device


2. Vibration Detection Device
3. Metallic foil or wire
4. Laser Beam Alarm
5. Photoelectric or Electric Eye Device
6. Microwave Motion Detection Device

Foot Rail Activator- are place on the floor in such a position that tellers may activate the alarm by
placing the front of their foot to engage the activation bar.

Bill Traps- bill traps or currency activation devices are usually place in the teller’s cash drawer and
connected to the alarm system using a wire connector.

Knee or thigh buttons- these are installed inside the desk or teller station which can be activated by
knee or thigh pressure.

Foot Button- like the foot rail permit alarm activation in relatively safety while both hands remain clear
in view of the robbers.

Double Squeeze Buttons- it is required pressure on both side of the device and therefore the
probability of accidental alarm is reducing.

TOPIC 17: Protective Locks and Key Control

Lock is one of the most widely used physical security devices in the asset protection program of
an installation. It complements other physical safeguards of the installation against any possible
surreptitious entry. However, the owner of the installation or his security officer needs to understand the
weaknesses and strength of each type of lock including the door, window or walls to be used to
achieve maximum benefit from it application.

Lock- is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry
into a building, room, container or hiding place.

Peterman- a term in England for lock picker, safecracker, and penetrator of restricted areas or room.

Types of Lock

1. Key operated mechanical lock


2. Padlock
3. Combination lock
4. Code-operated lock
5. Electrical lock
6. Card-operated lock

Lock and key system

1. The lock is the most accepted and


widely used security device.
2. Irrespective of their design and/or cost
they should only be regarded as
delaying devices.
3. Types of Locks by Installation
a. Mortise lock (or Lockset),
includes latch and deadbolt.
www.lock.com

Page 27 of 79
b. Bored or Cylinder lock
c. Unit lock d. Rim lock

Types of Locks by Operation are:

Key Locks - May be picked, possibility of loss or


compromise of key.

www.keylock.com

Warded Locks - offer no security, worst selection for


security

www.wardedlock.com

Disc Tumbler Locks - Sometimes called wafer locks,


more secure than warded locks, used on cars, desks
and cabinets.

www.pintumbler.com
www.disctumbler.com

Pin Tumbler Locks - Used extensively in


commercial, military, and residential security, more
secure than previous two.

Lever Locks - Used on safe deposit boxes and difficult to pick.

Conventional Combination Lock - May be opened by skillful manipulator.

Manipulation-Resistant Combination Locks - Provide a high degree of protection for highly


classified or important material. Locks with four or more tumblers are desirable for highly important
material.

Page 28 of 79
Relocking Devices – Attached to safes or vaults and add additional degree of security against forcible
attack.

Interchangeable Core - Cores can be quickly replaced. Locks can be keyed to an overall complete
locking system. They are economical, flexible and simplify record keeping.

Cypher Lock - is a digital combination door lock device e.g. X-07. This lock is the first improvement on
a dial lock technology since the Civil War. It is the most technologically advanced combination lock
available. It is more secure than mechanical locks and user friendly. Lock is self-powered by turning the
dial. Audit features on opening and closing, and is now the only lock that meets Federal Spec for
classified documents.

Code-operated Locks - Open by pressing a series of number buttons in correct sequence. High
security devices Card-operated Locks - Either electrical or electromagnetic; coded cards which are
etched, embossed or contain a pattern of copper flecks are used to operate the locks. Electro-
magnetic Locks - Operate by holding a door closed by magnetism.

Padlocks - Should be hardened and strong enough to resist prying, and should be locked at all times
even when not securing an area.

Keying Systems
1. Change Key - A key to a single lock within a master key system
2. Sub-Master Key - A key which will open all locks within a particular area in a facility.
3. Master Key - A key that will open all the locks when two or more sub- master systems exist.
4. Grand-Master Key - A key that will open everything in a system involving two or more master key
systems.

Key Control
1. Keys should be accessible only to those whose official duty require access.
2. Combination to safes, locks, and padlocks securing containers for classified information should be
changed at least once every 12 months or earlier where there has been an actual or possible loss or
compromise and when someone knowing the combination has been terminated, left on transfer, or
resigned.
3. When selecting combination numbers simple ascending or descending number grouped should be
avoided.
4. Storage of combination numbers should be in containers approved for the storage of the same
classification of material that the combination is itself protecting.

• Padlocks should be rotated around a facility regularly.


• Inventories of key systems should be carried out annually.
• The use of keys should be based on the general concept as applied to safe combinations.
• When a key is issued the following should be recorded:
a. Key number
b. Name of person
c. Position
d. Date of issue
e. Other relevant information

When a key is lost the following actions should be completed.


a. Circumstances should be investigated and a written report produced, and
b. the lock should be changed Master keys should be kept to a minimum and ideally remain with
security.

Traffic control:

1. Traffic control includes the following:

Page 29 of 79
a. Identification of employees and visitors
b. Directing movement of employees and visitors.
c. Package control
d. Control of commercial and private vehicles

2. All visitors to the site must be:


• Made to identify themselves
• Be limited to predetermined unrestricted areas
• The most effective method is by ID badges and cards

3. Identification Badges should be:


a. Tamper Resistant
b. Bear a clear and recent photograph of the holder (at least 1” sq. and updated every 2-3
years or when facial appearances change).
c. It must contain personal details such as:
Date of Birth
Height
Weight Both thumbprints
Color of hair and eyes
d. Should be laminated and of sturdy construction
e. Color coded where necessary
f. Signed by the holder
g. The design should be simple to allow for easy recognition at a distance

3.1 A badge system can only be effective if enforced.


3.2 A package control policy should be in place covering both receipts and dispatches, and widely
publicized.
3.3 Incoming packages should be inspected; in most cases a spot check is sufficient.
3.4 Where a practical vehicle parking areas should be away from the facility and protected from the
intruders.
3.5 Employees and visitors when leaving the site should pass a check and control point manned by
security.

Badge Reader
Interprets card, identifies card number, compares to database, checks authority/access rights
and allows or denies holder access.

www.accesscontrol.com

Page 30 of 79
Electrified Locks

Part of an access control system and has three purposes:


• To unlock door on authority from reader
• To lock/unlock at remote locations, usually back up by CCTV
• Auto lock/unlock on time basis.

Locks provide flexibility with fire alarm system and controls in


emergency.

There are three types of electrified locks:


 Electric Strike- most common
• Electromagnetic- power magnet
• Electric bolt- positive action

“Fail Safe” and “Fail Soft” “Fail Secure”: www.badgereader.com


• ‘Fail Safe’ - On power failure, door unlock for egress
• ‘Fail Soft’ - No recording of entry/exit
• ‘Fail Secure’- On power failure, door remains locked

ACS Control Units

Remote Control units, that translates communications and perform tasks between card reader,
electric door locks, and the central control unit.

Central control units comprise of:


1. Enrolment console
2. Central processor
3. Printer
4. Multiplexer

Biometrics
They all use a Personal Identity Verifier
(PIV), this is the unique pattern or other
feature of a person to be verified.

Types include:
• Hand geometry
• Iris
• Retina
• Signature
• Voice
• Vein Pattern www.biometrics.com

• Fingerprint Advantages and


disadvantages of Biometric Systems are
that some are intrusive, some easy to
forge, and some unreliable, however
developments continue to improve on their
accuracy and reduced error rates.

Other advantages are that they are


measure a unique trait that does not
change. There is nothing to lose or forget,
and can integrate with other industrial
standard readers.

Error rates are classified into two types:

Page 31 of 79
Type 1- erroneous rejection of authorized users.
Type 2- false acceptance of unauthorized users.

General Access Control Note


a. Visiting lorry drivers must have a separate waiting rooms.
b. Security classifications should never appear on ID badges
c. Weakest point in a personnel identification system is the failure of enforcement by security guards.

Types of Key

1. Change key
2. Sub-master key
3. Master key
4. Grand Master key

Key Control- once an effective key control has been installed, positive control of all keys must be
gained and maintained. This can be accomplished only if it is established in conjunction with the
installation of new locking devices. The following methods can be used to maintain effective key
control;
1. Key Cabinet
2. Key record
3. Inventories
4. Audits
5. Daily report

Security Cabinet – the final line of defense at any facility is in the high security storage where papers,
records, plans, or cashable instrument, precious metals or other especially valuable assets are
protected.

Three types of Security Cabinet


1. Safe
2. Vault
3. File room

Safes are designated either fire resistive


or burglary resistive. There is no Federal
or state law or code mandating the rating
of safes, and two organizations currently
rate safes in the U.S; the Safe
Manufacturers National Association
(SMNA), and the Underwriter’s
Laboratories (UL).

Fire Resistant Safes


Fire resistant safes offer very little
protection against the safe-cracker, and
once exposed to a fire the original
degree of protection offered is lost, and it www.safe.com
must be replaced.

Underwriter’s Laboratory (UL) Tests


a. Fire exposure
b. Explosion protection
c. Impact, fall of 30’ Safe is heated for 4 hours to 2000F, then left for 4 hours to cool off, then heated up
again.
Explosion impact test: Impact test drop of 30’. Return to furnace after cooling.

Page 32 of 79
Burglary and Robbery Resistive Burglary and Robbery resistive mercantile safes are classified by SMNA specs,
by UL ratings and by design features of doors, wall and lock. A classification table in this regard is set out below:
The design features of burglary resistant safes generally require the door to be made of steel and at
least 1.5” thick.

Page 33 of 79
Safe Cracking Methods:

a. Drilling or Punching- Accomplished by knocking off combination dial and drilling hole to expose the
locking device.
b. Burning- Using high temperature oxyacetylene torches or “burning bars” to cut an opening in the
wall or door of the safe.
c. Peeling- Attacking the seams of the metal plates with pry bars and other tools to peel back layers of
metal and thus exposing either locking mechanism or interior.
d. Ripping- Similar to peeling except ripping can be accomplished against solid, metal walled container
with a thin wall.
e. X-ray- Used to reveal the position of the combination and mechanism needed to open the safe.
f. Explosives- Nitro-glycerin and plastic explosives are still used but not as much as in the past.
g. Power Tools- E.g. Rotary devices, hydraulic tools and power drills. h. Manipulation- Very few safe-
crackers have the skill to use this technique.

Page 34 of 79
www.vault.com

• Ratings for vaults are established by the Insurance Services Office (ISO).
• Fire resistive enclosures. “No More Than” (NMT) 12 feet high or in excess of 5000 cu ft.

There are 3 Class Types:


a. Two Hour
b. Four Hour
c. Six Hour

Classification:
a. Burglary Resistive
b. Fire Resistive

Ground Support vs. Structure Support


a. Ground Supported- Reinforced concrete base, (8” for 4 hours, and 10” for 6 hour), independent
building with no fire resistance.
b. Structure Supported- Permitted to use existing floor if auto sprinkler system in use. Protection for
Vault Surfaces A. Vault Doors, Steel, drill and touch resistant, dial combination and time lock. b.
General Service Administration (GSA) Approved Vaults

Page 35 of 79
TOPIC 18: Security communications

Wire transmission of alarm and audio signals.


 Alarm Signals unshielded pair of conductors, cannot transmit audio over these.
 Audio Transmissions Shielded twisted pair for audio.
 Video Signal coaxial or fiber optics. ISDN video over phone lines to include color.

TOPIC 19: Fiber optic technology


Fiber walls made of glass and organic
polymers, almost impossible to access
information, is increasingly used to link
computers, CCTV, and command
modules in high risk area.

Advantages are: www.fiberoptic.com


1. Low level of false alarms
2. Compact
3. Immune to electrical or electro-
magnetic disturbances
4. Immune to wind born litter, animals, falling leaves, snow or weather changes.
5. Will not over heat, short circuit or spark.

TOPIC 20: Methods of Wire Transmission

Loop System
- Number of devices installed at intervals on a pair of twisted wires looped throughout an area to
a central control point.
Point-to-Point System
- Each sensor is connected directly to a control center by a pair of wires.
Multiplexing
- Several simultaneous messages on the same circuit. Defined as time sharing of dedicated
voice grade channels.
Central Station System- Transmit alarms to a central station outside the installation from which
appropriate action is taken such as notifying the police or fire department.
Proprietary System- Similar to a central station system except it is owned by and located on the
installation, and response to alarms is by the on-site security or firefighting staff.

TOPIC 21: Types of Alarm Detection

Page 36 of 79
Security Alarms
The purpose of Intrusion Detection
Systems (IDS) is:
To economize
To substitute in place of other security
measures
To supplement by providing additional
controls

The basic principles of operation are:


• Breaking an electrical circuit
• Interrupting a light or infra-red beam
• Detecting sound
• Detecting vibration
• Detecting sources of heat
• Detecting a change in capacitance
due to the penetration of an
electrostatic or electromagnetic field.

www.securityalarm.com

Alarm systems fall into two main categories.


a) Electro-Mechanical Metal Foil Magnetic Switches. Wire service detection Pressure Mats Ribbons or
wafers.
b) Volumetric Capacitance Vibration Microwave Ultrasonic Passive infra-red.

Proximity and capacitive sensors use essentially same principle.

Dual-tech sensors are combination or either IR and M-wave or IR and U-sonic.

Checklist for Indoor Sensors:


• Use in stable environment
• Microwave warning
• PIR/Ultrasonic cautious
• PIR/View

TOPIC 22: IDS System

There are three basic elements to an IDS –


a. Sensor or Trigger (Detector)
b. Circuit which transmits the change of condition
c. The signaling device, called the Enunciator

The functions of alarm systems are to:

Page 37 of 79
a. detects fire or intrusion
b. emergency notification
c. monitoring equipment or facility conditions. Between 95-98% of all alarm activations are said to be
false.

The most common causes of false alarms are:


a. user negligence
b. poor installation or servicing
c. faulty equipment

Glossary of terms for IDS systems

1. Actuator- The button, a magnetic switch, or thermostat that will cause the system to alarm.
2. Annunciator- This is the monitor, using visual or audible signaling that indicates the condition of the
associated circuits.
3. Capacitance- The property of two, or more objects, which enables them to store electrical energy in
an electrostatic field between them.
4. Capacitance Proximity Sensor- Records the change in capacitance or electrostatic field to detect
penetration through windows, ventilators and other openings and can be used to detect attempted
penetration into safes or storage cabinets.
5. Conductor- A material which transmits electric current, e.g. wire.
6. Control Unit- The terminal box for all sensors.
7. Fail-safe - A term applied to systems which will indicate by signaling or otherwise when they are
incapacitated through component failure, or low performance.
8. Duress Sensor - Used to call assistance, consists of hand or foot operated switch.
9. False Alarm - An activation of sensors by other than an intruder. (In the US they say by causes
unknown).
10. Intrusion Detection System (IDS) - The combination of components including sensors, control
units, transmission lines and monitor units integrated to operate in a specific manner.
11. Intrusion Detection Sensor- Devices that initiate alarm signals by sensing the stimulus, change or
condition for which it was designed.
12. Local Audible Alarm – An electronic bell or sounder for outdoor or indoor use in the vicinity of the
protected area.
13. Microwave Sensor- A radio frequency (RF) transceiver having a frequency range in GHZ which
detects motion.
14. Monitor- A device which sensors and reports the condition of a system.
15. Motion Sensor- Detects movement inside the area to be protected.
16. Passive Ultra-Sonic- Detects the sounds of forced entry throughout walls, ceilings and doors.
17. Penetration Sensor- Detects the entry through walls, windows, doors or any other opening into the
protected area.
18. Photoelectric System- Consists of two separate units, a transmitter and a receiver. An interruption
of the light beam between the two causes an alarm.
19. Ultrasonic- The frequency range of sound inaudible to humans. In IDS System, the range is
usually between 21.5 KHZ and 26 KHZ.
inside the protected area.
21. Vibration Detector- Detects forced entry through metal barriers placed over windows and
ventilators or attempts to drill, saw, or cut through walls, ceilings, floors or doors.

Page 38 of 79
Task/Activity

I - Identification: Identify the answer that corresponds to each question. Write your answers on the
space provided.

1. _____________________ interprets card, identifies card number, compares to database, checks


authority/access rights and allows or denies holder access.
2. _____________________ it offers very little protection against the safe-cracker, and once exposed
to a fire the original degree of protection offered is lost, and it must be replaced.
3. ___________________ it includes bodies of waters, mountains, marshes, ravines, desserts or
other terrain that are difficult to traverse.
4. ___________________ It properly designed and executed physical security programs should
deter or prevent, to the greatest degree possible, the loss of, theft of, or damage to an asset.
5. ______________________ each sensor is connected directly to a control center by a pair of wires.
6. ___________________ are designated either fire resistive or burglary resistive.
7. ___________________ these are installed inside the desk or teller station which can be activated
by knee or thigh pressure.
8. ___________________ transmit alarms to a central station outside the installation from which
appropriate action is taken such as notifying the police or fire department.
9. ___________________it is the final line of defense at any facility is in the high security storage
where papers, records, plans, or cashable instrument, precious metals or other especially valuable
assets are protected.
10. _______________ these are features constructed by man regardless of their original intent
that tends to delay the intruder.
11. _______________ it offers no security, worst selection for security.
12. _______________ detects forced entry through metal barriers placed over windows and
ventilators or attempts to drill, saw, or cut through walls, ceilings, floors or doors.
13. _______________ it is similar to a central station system except it is owned by and located
on the installation, and response to alarms is by the on-site security or firefighting staff.
14. _______________ it is accomplished by knocking off combination dial and drilling hole to
expose the locking device.
15. _______________ they all use a Personal Identity Verifier (PIV), this is the unique pattern or
other feature of a person to be verified.
16. _________________ this is not less than 7’ (excluding topping).
17. _________________ a system of barriers placed between the adversary and the subject of
protection.
18. _________________ it provides good visibility from both sides, for both guards and police
patrols.
19. _________________ this is also known as the 3rd line of defense.
20. _________________ the outer perimeter barriers located at the outer edge of the property.
21. _________________ system of ‘Defense in Depth’, is also called _________.
22. ____________________ this is the overhang of barbed wire or tape along the top of the fence,
facing outward and upward at approximately a 45-degree angle.
23. ____________________ it defines, the boundary of the property to be secured.
24. __________________ this is a predictable state or condition.
25. __________________ the property built into safety glass which allows it to chip or fracture into
harmless particles rather than in large pieces which are dangerous.

Page 39 of 79
II – Essay: Instruction - Answer the questions given below. Write your answers on the space
provided at least 200 words. (30 points)

Question: What is the importance of physical security when it comes to the defense in depth?

Essay Rubric
2 3 4 5 Earned
Points
Content A related The essay
The information This essay
content is includes minimal
includes includes detailed
mentioned information about
description information about
the content about the the description
activities done and the activities
Word The essay is The essay is 60 The essay is 90 The essay is 120
Count 30 words or words. words words.
less
Spelling Spelling and Some of the Most of the All spelling and
and grammar words are words and grammar are
Grammar errors are spelled correctly grammar are correct
frequent and some spelled
grammar is correctly.
correct.
TOTAL POINTS=

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Page 40 of 79
Task/Activity

Name: _________________________________ Date: __________


Year/Section: _____________________ Rating: _________

III – Part I
Matching Type: Match A with column B. Two (2 points each). Write your answer in the blank.
A B

_____1. made of glass and organic polymers A. Proprietary System


_____2. response to alarms is by the on-site security or
firefighting staff. B. Multiplexing
_____3. it is the weakest link in IDS system.
_____4. Defined as time sharing of dedicated voice C. Fiber Walls
grade channels. D. Actuator
_____5. a magnetic switch
E. Loop System
F. Line Supervision
G. Central Station System

QUIZ ANALYSIS

III - Part II
Identification: Write your answer on the space provided.

___________1. This is a material which transmits electric current.


___________2. The number of devices installed at intervals on a pair of twisted wires looped throughout an area
to a central control point.
____________3. It is the weakest link in IDS system.
_____________4. This is made of glass and organic polymers.
_____________5. Detects the entry through walls, windows, doors or any other opening into the protected area.
_____________6. An activation of sensors by other than an intruder.
____________7. This unshielded pair of conductors, cannot transmit audio over these.
____________8. It is owned by and located on the installation, and response to alarms is by the on-site security
or firefighting staff.
____________9. Protective circuits activate a visual or audible signal in the immediate vicinity of the protected
object or area.
____________10. This is versatile to cover all above requirement.

III – Part III


True or False: Write T if the statement is TRUE and write F if the statement is FALSE. Write your answer
in the blank.

______1. The line circuits should be able to be unchecked automatically by the system.
______2. Between 95-98% of all alarm activations are said to be true.
______3. Multiplexing is the time sharing of dedicated voice grade channels.
______4. The monitor detects movement inside the area to be protected.
______5. The purpose of Intrusion Detection Systems (IDS) is to substitute in place of other security
measures.

Page 41 of 79
III – Part IV

Direction: Write your ideas about the topic below.


Topic: What is/are the positive and negative effect of access control system in the establishment? (30
points)

Individual Activity
Positive Effect Negative Effect

Rubrics
5 Expert 4 Accomplished 3 Capable 2 Beginner Total
Score
Quality of  Piece was  Piece was  Piece had  Piece had no
Writing written in an written in an little style style
extraordinary interesting  Gives some  Gives no new
style style information information and
 Very  Somewhat but poorly very poorly
informative informative and organized organized
and well organized
organized
Grammar,  Virtually no  Few spelling  A number of  So many
Usage and spelling, and spelling, spelling,
Mechanics punctuation punctuations punctuation or punctuation
and errors, minor grammatical and grammatical
grammatical grammatical errors errors that it
errors errors interferes with
the meaning

Page 42 of 79
III – Part V

Identification: Write your answer on the space provided.

____________________1. This is the unique pattern or other feature of a person to be verified.


______________________2. They should be protected by lighting both on water approaches and at the pier
area.
______________________3. This is used to unlock door on authority from reader.
______________________4. It is the most common protective lighting, consisting of stationary luminaries, and
is generally employed for glare projection and control lighting.
______________________5. This is a common light bulb, provides instant light on power up, and can be
manufactured such that light can be reflected or diffused.
______________________6. This provides a means of continuing, during the hours of darkness, a degree of
protection maintained during daylight hours.
______________________7. Interprets card, identifies card number, compares to database, checks
authority/access rights and allows or denies holder access are example of ___?
______________________8. They emit a very bright light almost instantaneously when powered up.
______________________9. It means on power failure; door unlock for egress.
_____________________10. They project a narrow beam approximately 180 degrees’ horizontal and 15 to 30
degrees vertical.

III – Part VI

Essay: (10 points) Instruction: In your own word, explain what you have learn on this topic. What is the benefit
of the electronic access control system in an establishment?

5 Expert 4 Accomplished 3 Capable 2 Beginner Total


Score
Quality of Piece was  Piece was written  Piece had little  Piece had no
Writing written in an in an interesting style style
extraordinary style  Gives some  Gives no new
style  Somewhat information but information
 Very informative informative and poorly and very
and well organized organized poorly
organized organized
Grammar,  Virtually no  Few spelling and  A number of  So many
Usage spelling, punctuations spelling, spelling,
and punctuation and errors, minor punctuation or punctuation
Mechanics grammatical grammatical errors grammatical and
errors errors grammatical
errors that it
interferes with
the meaning

_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________

Page 43 of 79
III – Part VII

Direction: You are going to give other example of locks and keys that is/are not given in the topic.
Minimum of 3 per students. (10 points each).

Picture/Drawing Use of the locks and keys

Rubrics
4 3 2 1 Total
Score
Neatness Drawing/Picture Drawing/Picture Drawing/Picture Drawing/Picture
is in an orderly is in an orderly is in a packet is disorderly,
packet and is packet and is with several with many
incredibly neat, neat with a few smudge or tears smudges or
with no smudges or tears
smudges or tears
tears.
Completion All of the Most of the Some of the Student do the
assigned work is assigned work is assigned work is work
complete complete complete incomplete.
Timeliness Activity Activity was 1 Activity was 2 Activity was 3
submitted on the day late days late days late
due date
Accuracy All of the Most of the Some of the Little to none of
answers are answers are answers are the answers are
correct correct correct correct
Work All work is Most of work is Some of work is Little to none of
Shown meticulously meticulously meticulously work is
shown shown shown meticulously
shown
Total Score=
Page 44 of 79
III – Part VIII

Essay: In this activity, you can give an example on the situation given below. Write your answer on the
space provided.

Question: What do you do when you’re locked out?

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Page 45 of 79
LESSON 5
PHYSICAL SECURITY

TOPICS
1. Introduction
2. Physical Security
3. Physical Security System Components
4. Understanding Access Control
5. Employee Benefits of Visitor Management
6. Safety Benefits of Visitor Management
7. Business Benefits of Visitor Management
8. Managing Low- and Medium-Security Buildings
9. Documentation of ongoing events in the space
10. Alerting of Suspicious Behavior-on-Demand Video Surveillance
11. Audit Compliant Security Tracking Including Image Verification
12. Integrated IP Video Surveillance and Access Control
13. Security Surveys
14. Access Control
15. Roles and Responsibility
16. Understanding Physical Security
17. Understanding Security Consultants
18. Security Consultants vs. Security Firms

LEARNING OUTCOMES
At the end of the lesson, you should be able to:
1. identify the strategies applied in physical security system to achieve its
safety goals;
2. define physical security and its different levels of physical security system
designed;
3. understand the physical security system components, and employee,
safety and business benefits of visitor management;
4. discuss how managing low and medium security in buildings and how to
document the on-going events in the space;
5. explain how to handle cases where there is suspicious behavior caught in
the video surveillance camera and to track image of an intruder;
6. identify the need of security operation control room and also the need of
security survey;
7. discuss the site security plan which include biometric or card-swipe
security controls, isolation of restricted areas, password encryption,
etc.; and
8. discuss the role and responsibility, physical security, security
consultants.

Page 46 of 79
TOPIC 1: Introduction

This part is simple, at least. Every building needs a way to keep unwanted guests outside,
and most organizations also need to restrict access to certain areas within their premises, even to
people who have already been invited inside. Because of this, you need to adopt a set of security
measures with which to grant access to protected amenities to authorized personnel only, ones
that have been handpicked for this privilege. These security measures should be introduced in
accordance with a broader plan designed to protect your equipment, resources and any other
assets within a production facility or office space. All these measures, working in tandem, make
up your physical security strategy.
The best, most viable physical security strategies make use of both technology and
specialized hardware to achieve its safety goals. You will need to protect your assets from
intruders, internal threats, cyber-attacks, accidents and natural disasters, which in turn requires a
mix of technology and in-person monitoring that requires careful planning and placement of
security staff and other tactics. For your preventive measures and countermeasures to be
effective, you also need to introduce a security perimeter, the size and scope of which may vary
depending on your specific needs and possible threats to your facility. Physical security bundles
many needs together, so make sure you consider your space as a whole, not as separate parts.

TOPIC 2: Physical Security

What is Physical Security?


Physical Security- is simply defined as a system of barriers placed between the potential
intruder and the matter to be protected. It is also said to be the foundation of security.
Physical Security
- A system of barriers placed between the adversary and the subject of protection
- is defined as that part of security concerned with active, as well as passive measures,
designed to prevent unauthorized access to personnel, equipment, installations, materials, and
information; and to safeguard them against espionage, sabotage, terrorism, damage, and
criminal activity.

Levels of Physical Security

 Minimum Security- This system is designed to impede unauthorized external activity, which
may be in the form of simple intrusion or a serious armed attack. The protective objects,
therefore, are simple physical barriers such as doors and windows w/ ordinary locks.
 Low-Level Security- This system is designated to impede and detect some unauthorized
activity that threatens safety. This consists of physical barriers and basic alarm system that will
announce the threat. However, small business offices, stores or warehouses could be
protected with low-level security system.
 Medium-Level Security- This system is designed to impede, detect and assess most
unauthorized external and internal activities. The system should have the following features:
a) An advanced intrusion device installed apart the secured areas and monitored 24 hours.
b) A physical barrier and/or guard dogs set up in a perimeter before or beyond the confines of
the asset being protected.
c) Detailed security personnel (preferably unarmed) but with “mano-mano” combat training and
equipped with basic communication gadgets capable to warn and/or get off site assistance.
Entities and sites such as large manufacturing plants, large bonded warehouses, and mega
malls are suited for medium-level security.

Page 47 of 79
 High-Level Security- This system is designed to impede, detect and assess unauthorized
external and internal activities. This system is composed of all the measures and devices
incorporated in the three (3) levels above-cited plus the following:
a. Close-Circuit Television (CCTV)
b. A perimeter alarm system remotely monitored at or near the high physical barriers.
c. Security lighting equivalent to at least .02-foot candle of light around the entire protected
area is required (See table in this chapter for foot candle ratings).
d. A highly-trained, well-screened guard force or unarmed watch people who are equipped with
adequate advanced means of communications such as uninterrupted dedicated telephone
lines, two-way radios with police linkages, cellular phones, duress alarms, etc.
e. Electronic controls designed to restrict access to unauthorized persons within the facility.
f. Pre-defined arrangement with police for ready response and assistance is needed.
g. Coordination with other law enforcement authorities is also needed.
 Maximum Security System- This system is designed to impede, detect, assess and
neutralize all unauthorized external and internal activities. This system consists of all
previously-cited resources and should incorporate the following:
a. A highly-sensitive, sophisticated and advanced alarm system too strong to be foiled by a
lone individual remotely monitored in one or more protected locations and properly set up with
back-up source of power.
b. An armed highly-trained and well-screened guard force detailed 24 hours and equipped with
contingency armed system coupled with neutralizing or containing any threat against the
protected facility until the arrival of the off-site assistance.

TOPIC 3: Physical Security System Components

Physical security is always a component of a wider security strategy, but it makes up a


sizeable piece of this larger plan. Security experts agree that the three most important
components of a physical security plan are access control, surveillance, and security testing,
which work together to make your space more secure.

Access control may start at the outer edge of your security perimeter, which you should
establish early in this process. You can use fencing and video surveillance to monitor access to
your facility and secure the outdoor area, especially if you have on -site parking or other outside
resources. A comprehensive access control system and strategy would also include the use of
advanced locks, access control cards, mobile phones, or biometric authentication and
authorization. Most spaces start their access control at the front door, where cardholders swipe
their unique identification badges, or mobile phone, to gain entry. From there, you can place card
readers on almost anything else, including offices, conference rooms and even kitchen doors. At
the end of the day, each employee swipes out using the same process, eliminating the need for
clocking out or wondering if anyone is still inside the building after closing hours.

Surveillance is another important component to consider in your space. Modern security


systems can take advantage of multiple types of sensors, including ones that detect motion, heat
and smoke, for protection against intrusion and accidents alike. These sensors can hook up
directly to your alarm system, allowing them to trigger alarms and alert you and other system
administrators without any human intervention. Naturally, your security strategy should also
include the adoption of surveillance cameras and notification systems, which can capture crimes
on tape and allow you to find perpetrators much more easily. Cloud-based access control
systems update over the air and provide real-time reports, allowing you to monitor the system
from your mobile dashboard.
When disaster strikes, you need to act fast and in accordance with your adopted
procedures. That is why you need to test your disaster recovery plan on a regular basis, both on

Page 48 of 79
a technological level and a human one. Drills should test your ability to react both to natural
disasters and emergencies caused by internal or outside threats that can threaten data or
personal safety. Thankfully, access control systems allow you to tell who is still in your building
and who is outside in the case of an emergency that requires evacuation. You should also check
for weak points concerning access to critical business resources, such as server rooms, data
centers, production lines, power equipment and anything else that may impact your daily
operations. If you’re outfitting a sensitive area, such as a school or a place of worship you may
want to consider a system with a lockdown feature.
Examples of Best Practices
The specific security practices you should implement when creati ng a solid physical
security strategy always depend on the specifics of your premises and the nature of your
business, but many physical security plans share certain core elements. Working examples of
security strategy and countermeasures in physical security have a number of best practices in
common.
Your first line of defense may include fenced walls or razor wires that work at preventing
the average by-passer from entering your security perimeter. Protective barriers are used for
preventing the forced entry of people or vehicles and should always be complemented by gates,
security guards and other points of security checks. Once you get to the main building, locks are
a very effective method that enables only individuals with a key or a proper level of ac cess control
to open or unlock a door or gate. Locks may be connected to a more comprehensive security
monitoring system, which is quite simple to do. You can place alarms at each of these points that
are triggered if doors are held open for too long, if access cards have been swiped too many
times or if a badge has been used to swipe into a space twice before being used to swipe out of a
space. Even better, you can control access based on the time of day, keeping employees out
before and after regular hours. Cloud-based access control systems can be programmed or
integrated with a calendar so that the doors remain unlocked during certain times of day —for
example, a yoga studio might find it useful to keep the door unlocked up to 5 minutes after the
class begins and then the doors can automatically lock to prevent the teacher from pausing class
or latecomers from interrupting.
Your physical security should incorporate surveillance cameras and sensors that track
movements and changes in the environment, especially after hours. You also need to install
proper security lighting to ensure all monitored areas are visible at any given moment. Security
guards should cover all entry points to your facility during regular hours and even overnight, while
also securing business-critical areas indoors, like labs or server rooms. Water, smoke and heat
detectors, as well as a sprinkler system, are your protection against natural disasters like water
leakages, smoke buildup and fire.
Your last point of defense against unauthorized access is the use of smart cards,
biometric identification and real-time clearance aimed at allowing only authenticated, authorized
personnel to get into a restricted area or gain access to a certain amenity. In any event, you need
to assess all possible scenarios and study past examples of successful physical security
procedures before implementing feasible countermeasures for your facilities. By adding multiple
layers of authentication you make sure that only the people you have approved can access
certain parts of your facility. Thanks to huge leaps in technology, this is all possible now.
Wrapping Up
While all spaces are different, certain best practices are shared between many different
types of physical security plans. Access control, especially, is a great way to make sure that you
know who is entering your space, plus when and how they are doing it. By protecting your
important assets and sensitive data, you are saving yourself trouble down the line, especially for

Page 49 of 79
spaces that deal with important clients or secretive information. Physical security can be
confusing, but it doesn’t have to be with the right planning, any space can become more secure.
At one point or another, every office will need to invite visitors inside. Whether you’re
showing investors your facility, guiding tours through the office or hiring contractors to fix a piece
of equipment, non-employees will have to come through your doors. Relying on classic versions
of visitor management, however, is simply not enough in today’s competitive business world,
where innovations improve workplace management on an almost daily basis. Companies that
want to remain secure, prove their solid safety procedures and leave a positive impression with
customers and investors should consider implementing an access control system with strong
policies regarding visitors.
Visitors are largely a beneficial presence, but even the humblest offices still have private
information and sensitive data that they would prefer to keep away from outsiders, especially
ones who might use it for less than positive reasons. By improving your current visitor
management system, you can impress visitors while demonstrating just how secure your facility
is. Use this article to make sure your system is up to date and ready to guard your space.

TOPIC 4: Understanding Access Control

Unlike the old-fashioned method of logging visitors by hand, access control systems allow
you to keep track of who is in your space and where they are at all times. Access control works
by assigning badges to the people who use your space. Encoded in each of the badges, which
can take the form of swipe able cards, RFID chips or even QR codes, is a unique, identifying
number for that cardholder. Each ID number has a designated level of access, which allows
cardholders to access certain amenities based on clearance level, the time of day and any other
factor that you would like to monitor. Cloud-based access control systems integrate with visitor
management software, like Envoy.
Visitor access control allows you to assign temporary badges to visitors. These badges
are designed to expire after a certain amount of time and allow you to decide where, exactly,
each visitor can go within your facility. Instead of turning visitors loose, you can control their
movements and even revoke their access if they stay inside too long. A certain feeling of trust is
inspired in visitors when they enter your building, where the staff at the front desk welcomes them
with a warm smile and a personalized badge that is entered into a visitor pass management
system. As a first impression, this action makes your organization appear careful, diligent and
well-managed. On your end, this action ensures that everyone who enters your space has
entered identifying information into your system, meaning that they are responsible for the actions
they take once they’re inside. The value of electronic visitor access control is not only about
giving that special client treatment. Among other perks, this step amplifies the worth of your
current business, creating an extra real estate opportunity. Office buildings with proper visitor
management systems often sell or rent for higher rates than comparable buildings without this
resource.

TOPIC 5: Employee Benefits of Visitor Management

With today’s abundant, affordable technology, it is so easy to use a visitor badge system
and let computers do the work for you that it can be hard to imagine why any office wouldn’t
choose to put an electronic access control at the front door. Modern software can make the
entryways and other access points into watchdogs, and adding further checkpoints within your
facility allows you to continue implementing access control throughout mult iple offices or areas

Page 50 of 79
inside your building. Installing a separate reader on each door, allows you to know exactly who
tried to enter and when they did. Personalized badges enable this.
Data recorded from each access control reader, including data from visitor badges, is
stored in your system, so managers or trained security staff can access the reports and read the
events log as evidence for employee and client movement. A visitor badge system is like having a
discreet, watchful eye that automates your security functions. You and your personnel can worry
less, allowing you to spend more time on work without having to deal with complex security tasks.
It’s simple, but powerful, and your entire office will be able to work more effectively knowing that
they are safe.

TOPIC 6: Safety Benefits of Visitor Management

Knowing that you have an office visitor management system also scares off potential
intruders and burglars who might want to target your facility. A common tactic used by these
criminals is doing unannounced recon visits to offices that they mig ht want to target. They take
note of each office’s security measures, deciding if it’s worth the trouble to try to infiltrate the
space. If they notice that their visit is only being recorded on paper, they might be more likely to
attempt a burglary. Access control systems and proper visitor management, which are often
combined with video surveillance, is more likely to keep them away and sends them out to search
for more vulnerable offices as potential targets.

TOPIC 7: Business Benefits of Visitor Management

Don't underrate the impact of visitor management systems on productivity and resource
control as well. Tracking and measuring data extracted from your visitor management system
offers direct insight into the number of visitors you get on multiple time scales and can help you
direct your focus toward your most active client base. Knowing the movements of visitors, too,
can help you optimize your office for people who are coming inside. Sometimes, a proper visitor
management system is not only a convenience, but also a necessary tool. You may just need to
meet specific legal requirements and standards for safety, especially if you’re the owner of a
company that handles sensitive data or client information. You have a very real need for safety,
and a special license or certification for working in riskier industries, such as healthcare, finance,
and approved vendors, is impossible without having a reliable office visitor management system.
It’s an investment that will help you reap rewards in the long run.
Checking this data also helps you decide who should be invited back to your space. Time
spent inside is a solid indicator of how effective a maintenance team has been, for example. If a
certain low-stakes repair takes just half an hour for one contractor but two hours for another
maintenance company, the visitor access control data can help you choose the more efficient one
for a long-term contract. Similarly, if a visitor triggers an alarm within your space, you can revoke
their access and refuse to give them the ability to enter again.

TOPIC 8: Managing Low- and Medium-Security Buildings

Employees spend a large part of their days in the office and, as an employer, you
probably want this time to be spent productively. The entire facility should enable hard and
thorough work and bring out the best in all of your staff, in addition to being accessible, safe and
energy efficient. Visitor access control, then, is an incredibly important issue to consider,
especially through this lens. Although the comfort may be a priority for an office building that only

Page 51 of 79
requires a low or intermediate level of scrutiny, an office visitor management system can help in
both ease of use and physical security.
If your office building is classified as low- or medium-level risk, the data that allows you to
do business is most likely easily shared or even publicly disclosed, at least to a certain limit. The
loss of this confidential data, then, would not harm your reputation or finances critica lly, or at least
enough to drive you out of business. However, you should not be lax about protecting this
information. It is better, after all, to avoid breaches entirely than to react to them. As a general
rule, office buildings of these security levels can avoid the hassle associated with creating an
excessive visitor access control system, especially one that would require special licensing or
multi-factor authentication of visitors. But even when you don’t need to meet the necessary
criteria for legal security audits, your visitor management system should include the following
minimum elements:
 A front desk visitor passes management system
 Dedicated visitor management system software
 A visitor badge printer, which should be able to encode paper badges
 Printable access cards that work with your existing card readers
 A video surveillance system to monitor the building perimeter, access points and public
areas
 Parking lot or garage access control
 A central visitor access control board or system
 Motion detectors and other alarm inputs
 Access readers at each critical access point
 A method of contacting the proper authorities within your system in the event of a break -in
or breach

Depending on the needs of your business, you can decide to upgrade or downsize t hese
system requirements, but this is a good place to start. For example, small businesses that
operate out of residential buildings and educational or institutional organizations will likely be at
the bottom of the scale of security classifications, while corporate outposts and industrial,
chemical or research-based businesses will be near the top of the scale. For very large
commercial buildings, it is important to consider how an automated visitor management system
can be integrated into the overall building automation system. You can also choose to include
options for the monitoring and control of HVAC and lighting systems as a measure of energy
efficiency.

High-security office buildings typically require the more advanced protection of data and
other assets by law. Part of these requirements are met by employing trained staff and
conducting regular reporting and audits with official authorities. In case you need a physical
security audit example. A crucial part of this, too, is a rigorous visitor management system. The
loss of data or an attack on the system would significantly endanger the future, safety and budget
of an any high-risk organization, and such an event could also adversely impact the people and
resources that are important to stakeholders, clients and investors. All of this means that the risk
that arises from an inadequate visitor access control system is enough to potentially result in a
major litigation or investigations, massive financial losses, and detrimental consequences to the
health and safety of your employees.

Imagine, for a moment, the effects of an improper visitor management system in a


building that houses a laboratory. If anyone can simply walk inside or access high-security areas
because of a flawed access system, burglars or hackers could walk away with highly sensitive
information or industry secrets, which could bring ruin to any business. Obviously, it’s better to
avoid this type of situation entirely. When you are in charge of designing a visitor management

Page 52 of 79
system for a high-risk office, follow the lead of public buildings to create a security framework that
fits your needs, adjusting the design to the most advantageous form for your own business. Use
these important security requirements when you’re setting up the visitor management system in a
high-security office:

 Perimeter protection, including appropriate fencing, turnstiles, doors and locks


 Security staff to support video surveillance and triggered alarms
 Authority-based visitor access control, which is the most rigorous type of this kind of
system
 Comprehensive, clearly delineated levels of security clearance for staff
 Emergency escapes and alarms at all access points
 An incident response plan with regular testing
 Frequent staff security training
 Strong parking standards with personalized passes for visitors, clients and staff
 Two-factor authentication for secure rooms and areas
 Backups of the visitor management system log reports

Wrapping Up

A dedicated visitor management system is the secret weapon of any secure office. While
much energy is spent trying to make the employee experience safer, paying attention to visitors
helps to keep them from using your trust as a tool to gain access to your secure files and data.
It’s worth the extra effort to spend time creating a comprehensive plan, com plete with access
control, dedicated security measures and plenty of backups for each component.

For cameras and video systems for the purpose of video surveillance and security, there are 4
main options:

- Standalone smart home camera for small business use


- Standalone DVR system
- Standalone IP video camera system
- Integrated IP video and access control system

In the end it helps to start with the purpose: Why do i need a video system? Legitimate reasons:

TOPIC 9: Documentation of ongoing events in the space

Basically you want to have proof of events or suspicious behavior to show to law
enforcement or police if things get stolen. In startups laptops or other re-sellable items get stolen
more often than people think. It's not a topic that appears in the media a lot, so it's not on
everyone's radar. But basically if you think of ongoing documentation and no other needs, you
could just buy a Deli-style DVR system which records a certain amount of video hours. If
something happens, you could go back in time on the video and see what happens. Make sure t o
buy a system that has some sort of infrared / night vision capabilities.

TOPIC 10: Alerting of Suspicious Behavior-On-Demand Video Surveillance

If you'd like to have alerts set up for when a door unlocks and two people enter or
something more specific, you'd need to either buy an integrated IP video and access control
system, or if something more basic is enough, get a consumer grade wireless video camera
which can send alerts during certain hours also. Real Time Monitoring of Your Facility

Page 53 of 79
Real time monitoring means you have to have some sort of remote video visualizati on and
surveillance capabilities. Live streaming of video can cost a lot of bandwidth and it is highly
recommended to have a sophisticated IT manager on board when planning this - otherwise your
network goes down from the video stream volume alone. Again, standard consumer grade
wireless cameras can be a great start before jumping into more precise video solutions.

TOPIC 11: Audit Compliant Security Tracking Including Image Verification

If you need to verify identities with video image recognition or behavior tracking, you need
the highest end systems the market can provide. Milestone Systems or similar are great video
technology companies who provide cutting edge systems for enterprise.

Smart Home

Smart home cameras are great, affordable and fast to deploy products. Perfect for small
businesses with a minimum IT budget and they allow many advanced functions. Of course
precision, image quality, transmission speed, security and many more features are somewhat
basic, but you can get an ok security with a Ring Wireless Doorbell or Nest Camera.

Kisi's opinion: You are looking for a fast start or a quick fix - this is the way to go. Don't expect
anything beyond though.

DVR Systems

If you've ever visited a Deli-Shop you know DVR systems. Typically, those systems have
four to six hardwired cameras with a DVR recorder. You can also connect a TV screen to the
DVR so you see events in real time. Sometimes these systems are called "security systems" -
keep in mind that a security system typically has alarm, video but also access control.

Kisi's opinion: Just having something in hand in case a break-in happens makes sense and is
the perfect use-case for DVR systems. No need for ADT or the likes.

Standalone IP Video

Typically, it gets expensive here. For a standalone IP video system, you need a custom
setup and companies like Milestone System will charge you a large price tag. Stores
like Trendnet provide customizable solutions which you would most likely buy through a local
integrator. The great thing is that you can call most manufacturers and they'll recommend you a
local security company to work with.

Kisi's opinion: IP video surveillance means going "pro" - make sure you have the budget and the
IT infrastructure to support those solutions.

TOPIC 12: Integrated IP Video Surveillance and Access Control

There are good reasons to have video surveillance and access events combined in one
central dashboards. Most likely companies who operate SOC's (Security Operations Control
rooms) have exactly that setup. A popular provider in the startup world is S2 Security who is
actually an access control provider but has their own video solutions on top.

Page 54 of 79
Kisi's opinion: Going this route means you are a fortune 500 company or need to behave like
one.

About RedTeam Security Consulting

RedTeam Security Consulting is a specialized, boutique information security consulting firm


led by a team of experts. The company, founded in 2008, is based in Saint Paul, Minnesota. Its areas
of business include in-depth manual penetration testing, application penetration testing, network
penetration testing and social engineering.

When Is Testing Needed?

When is a physical testing needed? There are certain situations when an IT director needs to
start thinking about testing his company’s physical security. Ryan listed three of the most important
situations where he thinks a testing is required.

When physical security becomes a realistic attack factor that cannot be ignored, it means that
you truly want to understand what your attack surface looks like. That is when you need to consider
having a physical penetration testing toolkit. Similarly, you need to prepare and test social engineering
campaigns to reduce the likelihood of the success of these campaigns.

Sometimes there are people at your company who don’t exactly understand the security
weakness. Or they understand them but need buy-in from their decision maker. In those cases, you
might want to learn about the ‘unknown unknowns.’

Finally, compliance also drives suggestions for testing; but usually, the regulatory bodies only
suggest testing, but do not require it specifically.

What Happens If You Never Do Security Testing?

The most important aspect of security testing is to validate the assumptions you have about
the current security setup. If you are not testing it, two crucial problems might occur:
 You don’t have the opportunity to confirm that your assumptions about the current security
system are correct, or that the system is indeed working.
 You can’t test your own response behaviors.

It is important to test your response capabilities and speed: What do you do if something like
this happens and how will you react? How well can you handle the situation and how fast can you
react? Those things have to be learned through testing.

What Can You Learn by Completing a Penetration Test?

In a physical security penetration test you can learn about it in a controlled set of
circumstances. People used to say “if something happens.” Now, this is shifting to “when something
happens.” That’s to say, in doing a penetration test you’re preparing for the event knowing the event
will happen—just not when it happens. What does the communication plan look like, how are you
dealing with it time wise and publicity-wise? The theme here is, “preparing to prevent and preparing to
react.”

For testing physical security, specifically, you should focus on the different controls—are you
able to breach the perimeter, are you able to get in the building? Once you’re inside, are you able to
obtain the objectives?

Page 55 of 79
Physical security testing is often not done in a vacuum. “Red Teaming” is the name for the
approach to understand the entire attack surface across three different verticals:
 Cyber Security
 Human Social Engineering
 Physical Security
Of those, often the physical vector is the most underrated, but humans are statistically still the
weakest link. The application/cyber security is the second weakest link, right after human social
engineering.

What Does the Testing Process Typically Look Like?

If you’re wondering how the testing process is done, or physical penetration tools, Ryan gave a
real-life example of how Red Team Security conducts its testing:

First, they work with a small leadership group. The right people need to know, but they don’t
want too many other people to know, otherwise it would spoil the value of the test.

They work with clients to understand the client’s assets—such as customer data. Then they
come up with an attack plan on how to potentially obtain those assets. Only the minimum amount of
information is collected during the discovery. Next they have an operational plan to get approval from
the client and they execute the plan. During execution, they stay in touch with their point of contact in
order to map their actions against the client’s reactions and evaluate their response capabilities. Lastly,
they consider re-testing to confirm that this has been fixed and to also set up a schedule for re-testing.

Finally, it’s important to realize that these tests are not meant to be a punitive exercise to find
out what your company and your people are doing wrong. Ideally, everyone at your company does their
best, but there are new problems arising all the time—problems you just don’t have time to worry
about, especially when your priority is uptime or the performance of the systems.
This site security plan will act as a template that ideally should be customized to the specific site
based on its security needs. It should summarize all personnel responsibilities and procedures
involved, and be fully understandable by everyone in your organization.

Scope of the template:

The site security plan intends to provide direction for facility officers to make adjustments
to improve the overall facility.

In addition to pre-existing security, this sample plan also outlines the mechanism for:
 Applicability
 Risk assessment
 Defining threats levels
 Authority and responsibility
 Access control
 Restrictions
 Data management
 Monitoring and updating
 Security testing

Applicability

Page 56 of 79
The site security plan is applicable to every individual within the site and should receive
the appropriate training or briefing before entering the building. This includes all staff, security
personnel, faculty, and visitors.

Risk Assessment

The Information Technology Officer and the Security Officer are responsible for assessing
the level of risk. Risk assessments are made in response to a potential of actual effects of an
incident. From the facility’s physical security level perspective, this is completed through
monitoring and testing the floor layout, location and security of restricted as well as sensitive
areas, emergency standby equipment, existing policies, procedures, guidelines, training, and
finally the knowledge of individuals on site.

Looking at risk assessment from the perspective of data security, the site security plan
should be stored in a central location for easy access to individuals within the site, but pro tected
from any outside use. It should also be updated when necessary and examined by the designated
officials (such as the Information Technology Officer and the Security Officer) daily.

By constantly monitoring for changes and testing present procedures, the level of risk to
the facility can effectively be gauged and the security countermeasures can be put in place.

When responding to an occurrence the format the of the response should start by
reporting the event, notifying the pertinent responders or officers, responding to the incident,
recovering, documenting, and briefing individuals on site on the occurrence.

TOPIC 13: Security Surveys

Security Surveys’ are often called “Risk Analysis Surveys” or “Risk Assessment Surveys”.

A Security Survey is defined as the process of conducting an exhaustive physical and thorough
examination of all operational systems and procedures of a facility for the following purposes:

a. To determine existing state of security


b. Identifying weakness in defenses
c. To determine the degree of protection required
d. To produce recommendations for a total security system.

1. The survey should be undertaken by either suitably trained staff security personnel, or a fully
qualified independent security specialist.
2. No Universal checklist can be applied to all sites for survey purposes as no two facilities are alike.
3. Before commencing a security survey:
• Written authority should be obtained from the site director
• Previous surveys should be reviewed
• An orientation tour should be made
• Photographs should be taken of things which will be difficult to describe in a report. (Only with
authority)
4. After completing the survey an immediate review of the findings should be undertaken with the plant
supervisor so that urgent deficiencies can be addressed.
5. A follow-up survey should always be conducted to ensure improvements and recommendations
have been made.
6. Any survey report including lists of recommendations is incomplete without including a cost benefit
analysis, which is - “a direct comparison of the cost of the operation of the security unit and all the
existing security measures with the amount of the corporate assets saved or recovered as well as
reduction of losses caused by injuries and lost production”.

Page 57 of 79
7. No security measure should be recommended which is not cost effective.

Determining Threat Level

Similar to risk assessment, both the Information Technology Officer and the Security
Officer must look at the security levels of the facility and its contents. However, the offi cer should
also focus on the internal software security as well as the geographical context of the facility. This
includes but is not limited to the security level of the region and country, as well as the history of
the security software being used in PDAs, laptops, web-based servers, and file transfer protocol
servers.

TOPIC 14: Access Control

It should be noted that access control includes both access to data, servers, and
networks, as well as access to the physical site. The site security plan should include biometric or
card-swipe security controls, isolation of restricted areas, password encryption, etc.

When a facility has more than one level of security (for example has public areas or
several levels of security or clearance levels) separate procedures should be dedicated to each
level of security. With restricted or higher security concerned areas, they should be physically
more isolated, have more physical and network barriers, as well as a noticeable increase in
closed-circuit television. Additionally, these areas should also involve systems with a higher
probability of infiltration detection. More secure or restricted areas should include software that
will assess or prevent unauthorized access.

Are you looking to meet security compliance requirements and secure your facility with
the most advanced technology? Discover how the Kisi platform is changing the physical security
industry.

TOPIC 15: Roles and Responsibility

The designated officials, primarily the Information Technology Officer and the Security
Officer, are responsible for the physical security and integrity of data on site. This also includes
overseeing the procedures for data disposal, account access control, password and protection
policies, backup, and system storage. In addition to establishing these procedures, officers are
also responsible for the training, education, and awareness of the site security plan.

Though a site security plan and the authority involved should always include the
Information Technology Officer and the Security Officer, or similar equivalents, it can include
other positions of authority. These roles and responsibilities are dependent on how this site
security plan template is adjusted to the site. Common examples include but are not limited to a
facility security committee, additional designated officers, security organizations, financial
authority, and so on.

Personnel

Human Resource Officers are also responsible for site security through the due diligence
hiring process. While hiring potential individuals the Human Resource Officer must exercise an
additional security vetting process as well as include non-disclosure and confidentiality
agreements. This security vetting should include pre-employment background, criminal checks,
as well as drug screenings administered by the appropriate agencies.

Page 58 of 79
The Human Resource Officer is also responsible for communicating and passing on the
employee handbook. Within the handbook should include the site security plan, as well as the
confidentiality agreement, national and state labor laws, equal employment and non-
discrimination policies, and leave or compensation policies. Finally, after initial hiring, the new
employee should also attend any training conducted by the Information Technology Officer and
the Security Officer.

Monitoring

The use of detection and application for security measures should be constant.
Designated officers should push for updated firewall protection, anti -virus management software,
and intruder detection devices. Any activity or behavior that leaves individuals or systems
vulnerable should be immediately detected, reported, and repaired. A line of communication
should also be established to ensure that all individuals on site have an equivalent understanding
of the site security plan.

Updating and Testing

The site security plan should be updated and tested at least once a year. However, it is
the responsibility of the Information Technology Officer and the Security Officer to critically
evaluate and continuously improve the site security plan. With every new change, the site
security plan should then be communicated accordingly.

Office security is essential for peace of mind and proper business practices. But
implementing safety procedures and equipment can be a confusing process to a security novice,
especially in today’s digitally-driven world. Thankfully, you don’t need to be an expert on physical
security to benefit from the knowledge of one. If you are just starting out with access control, you
should consider hiring a physical security consultant to help with your access control project.
Choosing the right one can be a difficult process in itself, so follow these rules to make sure that
you make the best choice for your business.

TOPIC 16: Understanding Physical Security

Physical security is exactly what it sounds like: Protecting physical assets within your
space. This includes expensive equipment, sensitive files and hardware like electronic locks and
doors. It takes an expert to make sure that you’re optimizing your physical security system for the
unique needs of your building or facility. If you find yourself in charge of a smaller company, the
installer you choose can often act as a kind of security consultant as well, which will help you to
get the basics covered while avoiding hiring another contractor. Spaces that do not have any sort
of special restrictions or requirements around security can get the job done in this way —it’s up to
your discretion.

However, if you are part of a larger company or have more demanding security needs,
you might want to think about hiring a physical security consultant for your project. An important
fact that most people don't know is that these consultants can also write your system specs and
help you get bids from security companies for your new security system, which removes t he
stress of doing it all on your own. They probably have a deep bench of installation companies at
hand with which to distribute your bid, which can be better than the ones that you might dig up on
Yelp. In fact, some installers don't even consider working with people they don't know, meaning
that if you don't come recommended, they won't work with you. While not every job might require
a consultant, they could save you money or time during installation.

Page 59 of 79
TOPIC 17: Understanding Security Consultants

There are many small reasons why people hire a physical security consultant, from being
able to complete a project faster to added security assurance. One main reason is that they can
simply devote more resources to security analysis and planning, which usually takes time during
the day that a full-time worker might not have. This lets them avoid being bogged down by other
work that could otherwise distract in-house security managers. They can also offer new insights
for your business from a seasoned perspective. Within a company, you can often find yours elf
taking things for granted, not thinking about changing them until someone from outside comes in
and disrupts tradition. Your consultant knows the tricks and best practices of other organizations
of your size, which helps because most problems in security are shared across a great deal of
companies, many of whom have already found an answer to the issue.

By being involved in the industry day in and day out, absorbing the latest trends and
developments, consultants can also bring important know-how and authority when submitting a
security request for proposal (RFP). Consultants can assume a neutral position, recommending
equipment and practices objectively. They also know how to write and present security plans,
plus how to spot issues that might be hidden at first. Due to the experience in writing and
presenting, the security consultant can possibly communicate their findings and strategies better
than an in-house security manager. The technical experience the security consultant brings to the
table is unique when compared to the general security knowledge of regular employees. Standard
situations can be handled easily and unique ones can find solutions much faster.

TOPIC 18: Security Consultants vs. Security Firms

If you’re considering hiring a security consultant, you get to decide whether you want t o
employ an independent consultant or a full-fledged security firm. Independent security
consultants often boast years of training and experience offering their professional advice, and
many offices prefer hiring them because they are not affiliated with larger firms or agencies that
might have certain stiff operational procedures or preferred vendors. They also might be more
cost-effective for smaller operations. If you choose this path, make sure that you find a consultant
that is certified by at least one security organization. You can tell their qualifications based on
their credentials, including Certified Protection Professional (CPP), Physical Security Professional
(PSP) and Certified Security Professional (CSP). There are also industry -specific certifications,
including Certified Healthcare Protection Administrator (CHPA). These, generally, are the
hallmarks of a more trustworthy consultant. They can also belong to the International Association
of Professional Security Consultants (IAPSC).

Security firms are often favored by larger businesses or offices that want the backing of a
major organization. They tend to boast greater resources and can be easier to research based on
their sheer size. If you would prefer to buy your equipment through your consultant, this is the
route you can take. Firms have fewer certifying organizations, so the best way to choose one is to
look at online reviews, research their clients, and find their annual revenue reports. When it
comes to hiring a security consulting firm, bigger is often better, but don’t discount local options.

Hiring Security Consultants

If you’ve made it this far, you’re likely ready to take the next step and hire a physical security
consultant. While this can be the most difficult part of the process, there are plenty of resources
to make this decision a little easier. As mentioned above, the IAPSC is a great resource for
finding independent consultants. Members come from all over the world and specialize in dozens

Page 60 of 79
of industries, so you should easily be able to find a consultant that fits your needs through their
site. Finding the right security firm can be a little bit harder, but you’ll probably recognize the
bigger names within the industry. Deloitte, PwC and Accenture are all popular firms in the s ecurity
space, but many other firms might be best for your requirements and your budget.

Key Takeaways

Each business is different, so before you make the decision on whether or not to hire a
security consultant, consider the needs of your space. You should have a security system, and if
you lack the expertise to install an effective one, a consultant might be the perfect solution to your
problem. Like any other contractor, make sure you do your due diligence and make sure that you
can afford to pay for their insights and advice. The right consultant can make your business more
efficient, more secure, and, of course, much safer.

Page 61 of 79
Task/Activity

I - Identification: Identify the answer that corresponds to each question. Write your answers on the
space provided.

1. _______________________ it is always a component of a wider security strategy, but it makes


up a sizeable piece of this larger plan.
2. ______________________ it is simply defined as a system of barriers placed between the
potential intruder and the matter to be protected. It is also said to be the foundation of security.
3. ______________________ it is defined as the process of conducting an exhaustive physical and
thorough examination of all operational systems and procedures of a facility.
4. _______________________ it may start at the outer edge of your security perimeter, which you
should establish early in this process.
5. ______________________ Who will be responsible for the physical security and integrity of
data on site?
6. ______________________ it is the name for the approach to understand the entire attack surface
across three different verticals.
7. ______________________ it is another important component to consider in your space.
8. ______________________ it can take advantage of multiple types of sensors, including ones
that detect motion, heat and smoke, for protection against intrusion and accidents alike.
9. ______________________ This system is designed to impede, detect, assess and neutralize all
unauthorized external and internal activities.
10. _____________________ This system is designed to impede unauthorized external activity,
which may be in the form of simple intrusion or a serious armed attack.
11. ______________________ This system is designated to impede and detect some unauthorized
activity that threatens safety.
12. ______________________ are used for preventing the forced entry of people or vehicles and
should always be complemented by gates, security guards and other points of security checks .
13. ______________________ they agree that the three most important components of a physical
security plan are access control, surveillance, and security testing, which work together to make
your space more secure.
14. ______________________ it allows you to assign temporary badges to visitors.
15. ______________________ it should incorporate surveillance cameras and sensors that track
movements and changes in the environment, especially after hours.
16. ______________________ are often favored by larger businesses or offices that want the
backing of a major organization.
17. ______________________ it affordable and fast to deploy products.
18. ______________________ it is essential for peace of mind and proper business practices.
19. ______________________ he knows the tricks and best practices of other organizations of
your size, which helps because most problems in security are shared across a great deal of
companies, many of whom have already found an answer to the issue.
20. ______________________ are made in response to a potential of actual effects of an incident.

II – Essay: Answer the questions given below. Write your answers on the space provided. See
rubrics at the last page (10 points each).
1. Physical security covers many aspects of security around an installation or facility. What are those
various types of physical security countermeasures as you know by now and explain each?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Page 62 of 79
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2. How security systems play an important role in protecting national security and other assets?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

3. What are the importance of having a security consultant in a company?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

4. What are the major purpose of physical security?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
Page 63 of 79
LESSON 6
PLANNING AND IMPLEMENTATION

TOPICS
1. Introduction
2. Physical Security Planning
3. SOPs and Post Orders
4. Inspections
5. Security Plan
6. Voluntary Principles on Security in Host Community
7. Guidelines for GSF (Soldiers, Policemen)
8. Responsibilities of GSF
9. Antiterrorism/Force Protection
10. Anti-terrorism
11. Terrorist Threat Levels
12. Improvised Explosive Device (IED)
13. Travel, Residential and Office Security
14. Security Management and Corporate Security
15. Contingency Measure and Emergency Response
16. Executive Protection

LEARNING OUTCOMES
At the end of the lesson, you should be able to:
1. discuss the physical security planning;
2. explain the SOPs and Post Orders;
3. discuss how inspection conducted;
4. explain the security plan and document outlining all the security operations
and activities and voluntary principles on security in host community to guide
them in maintaining the safety and security of their operations within a
framework that ensures the sanctity of human rights;
5. familiarize with the guidelines for GSF and their responsibilities;
6. discuss the anti-terrorism and the need for increased awareness of the
probability that another terrorist attack will occur;
7. understand the relationship between physical security and terrorist threat
levels;
8. discuss the improvised explosive device (IED) and how it will have delivered
or emplaced in the following ways;
9. familiarize with the different security approach which includes travel,
residential and office security;
10. understand the effective uses and procedures such as risk assessment, risk
analysis and security survey to identify threats and system vulnerabilities and
implement effective controls;
11. explain the contingency measure and emergency response and the
executive protection of VIP exposed to elevated personal risk because of their
employment, high profile status, net worth and social affiliations. Protective
measures may include home security systems, body guards, armored vehicles,
mail screening, private jet travel and other precautions.

Page 64 of 79
TOPIC 1: Introduction

Objective in this lesson, you will learn about physical security planning, antiterrorism, and force
protection, as well as the tools used to accomplish these critical functions.

Here are the lesson objectives:

• Identify the purpose of physical security planning and its tools


• Define antiterrorism and force protection and their tools

TOPIC 2: Physical Security Planning

Planning for the security defense of an installation or activity must be constant, practical,
flexible to the mission, and responsive to the needs of the commander or director. Only through
adequate planning can we provide an effective counter response to security threats.
Physical Security Plans are comprehensive written plans providing for appropriate and economical use
of personnel and equipment to prevent or minimize criminal or disruptive activities. It is essential that
each installation, unit, or activity develop, implement, and maintain a physical security plan. At a
minimum, the plan should include special and general guard orders, access and material control,
protective barrier and lighting systems, locks, and intrusion detection systems.

Physical security plans have the potential to be designated for Official Use Only (FOUO) or may even
be classified, and must be protected accordingly.

TOPIC 3: SOPs and Post Orders

SOPs and Post Orders

Standard operating procedures (SOPs) and Post Orders establish duties and responsibilities.
This ensures that everyone involved knows the procedures so that duties are carried out consistently
and uniformly. Using SOPs and Post Orders will assist in maintaining operational order during both
normal and stressful situations. SOPs are supplemental guidance for implementing specific
components of your physical security program. SOPs are typically established to cover events such as
fire, explosion, civil disturbance, major accidents, hostage situations, sabotage, bomb threats, terrorism
attacks, and natural disasters. SOPs are also implemented to establish operational and administrative
physical security procedures such as badging, escorts, and key control. Post orders typically establish
duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts.

TOPIC 4: Inspections

Inspections

As a security professional, you may be a participant in a physical security inspection, either


conducting an inspection, or being inspected. Inspections can ensure compliance with the physical
security plan, verify policy compliance, promote cost effective security, serve as an opportunity for
security education, establish and/or enhance good working relationships, identify existing or potential
program weaknesses, and promote quality performance of security functions. As you can see,
inspections serve many purposes. The results may be formally documented with observations,
findings, and recommendations, or with informal discussions.

There are two types of inspections: compliance inspections and self-inspections.


1. Compliance Inspections- the compliance inspection focuses on ensuring regulatory
requirements are being met, usually by someone who may be in your immediate chain of

Page 65 of 79
command or higher headquarters. Assist visits, command inspections, and Inspector General
(IG) inspections are all examples of compliance inspections.
2. Self-inspections- A self-inspection is a review conducted by members of your own organization,
usually with the aid of a checklist. Self-inspections may serve to aid internal control, prepare for
compliance inspections, and ensure your physical security program is implemented in a cost
effective manner.

TOPIC 5: Security Plan

It is a document outlining all the security operations and activities in a production facility or
even in a residential area.
 It ensures that security is an integral part of the business by providing an enabling or
conducive working environment to achieve business objectives.
 It provides Management with an overview of security activities in specific projects.
 It coordinates all security processes in the production assets within the host community.
 It serves as a reference point for monitoring performance and evaluation.
 It defines resource requirements in terms of equipment, manpower and budgeting.
 It provides Management with security information for timely decision making.
 It is concerned with the provision of a safe working environment for staff and contractors and
protection of company property from damage and theft.

TOPIC 6: Voluntary Principles on Security in Host Community

These principles were collectively developed by the US, UK, Norway and Netherland
governments for firms operating in the extractive sector to guide them in maintaining the safety and
security of their operations within a framework that ensures the sanctity of human rights. They are:
 Recognition of the need to dialogue with host community and contribute to their welfare.
 Prevention of conflict where possible.
 Using force only when life is threatened.
 Deployment of security must be appropriate and proportional to the risk envisaged.

TOPIC 7: Guidelines for GSF (Soldiers, Policemen)

 Operating strictly within the laws of the country and the authority given to them by the security
agency they represent.
 Using force as a last resort and in accordance with international humanitarian law.
 Reporting any incident involving the use of gun to a facility security supervisor and submitting a
written report within 24hrs of the incident.
 No use of fire arms against any person engaged in civil protest or peaceful demonstration.

TOPIC 8: Responsibilities of GSF

 Respecting and protecting human dignity and human rights of all persons.
 Respecting safety regulations especially the 12 life -saving rules.
 Preventing crimes such as theft, armed robbery, kidnapping or any act of terrorism and
ensuring security of company personnel and property.

Page 66 of 79
 To assist in preventing unauthorized access into company premises.
 To report any security incident promptly to the Facility Security Supervisor (FSS)

TOPIC 9: Antiterrorism/Force Protection


Our nation has always been aware of potential terrorist threats. However, incidents such as the
attack on the Murrah Federal Building in Oklahoma City, in April 1995 and the 9/11 terrorist attack, as
well as various attacks around the world, have proven to us that there is a need for increased
awareness of the probability that another terrorist attack will occur.

TOPIC 10: Anti-terrorism

Antiterrorism is defined as those defensive measures used to reduce the vulnerability of


individuals and property to terrorist attacks, to include limited response and containment. Antiterrorism
physical security measures integrate facilities, equipment, trained personnel, and procedures into a
comprehensive effort designed to provide maximum protection to personnel and other DoD assets.
Well-designed physical security measures include: detection, deterrence, delay, denial, and
notification. These efforts are accomplished through the development of an antiterrorism plan, outlining
who will do what, where, when, and how. This overview is intended to familiarize you with the basic
terminology used in the DoD Antiterrorism Officer (ATO) Guide. History has proven we must always be
vigilant.

TOPIC 11: Terrorist Threat Levels

Terrorist threat levels are something many of us are aware of at this time in history. Terrorists
are not just an ocean away any longer. Terrorist threat levels should not be confused with Force
Protection Conditions, also known as FPCONs. Threat levels are provided to senior leaders in order to
assist in determining the appropriate FPCON level. DoD uses a set of standardized terms to quantify
terrorist threat levels. Threat levels are identified as Low, Moderate, Significant, and High. Low signifies
no terrorist group is detected or the terrorist group is non-threatening. Moderate signifies terrorists are
present but there are no indications of anti-U.S. activity. The Operating Environment favors the Host
Nation or the U.S. Significant signifies anti-U.S. terrorists are present and they attack personnel as their
preferred method of operation, or a group uses large casualty-producing attacks as their preferred
method, but has limited operational activity. The Operating Environment is neutral. High signifies anti-
U.S. terrorists are operationally active and use large casualty-producing attacks as their preferred
method of operation. There is a substantial DoD presence, and the Operating Environment favors the
terrorist. As a security professional, it is important to understand the relationship between physical
security and terrorist threat levels.

TOPIC 12: Improvised Explosive Device (IED)

It is also known as a roadside bomb or a homemade bomb constructed and deployed


in ways other than in conventional military action meant to cause destruction of lives and
property by terrorists who are not fit to live among human beings. It is delivered or emplaced in
the following ways:

 VBIED – Vehicle Borne IED is placed in a parked or a moving vehicle.


 SBIED - Suicide Borne IED is tied to a suicide bomber.
 Rubbish bins, trash cans are also used in emplacing IED

Page 67 of 79
 IED could also be emplaced in drainages and culverts.
 Dead animals are also used in delivering IED.

Bomb Prevention Tips


 Disallowing people with bags from entering the premises.
 Suspicious looking packages, paper bags left alone be scrutinized.
 Avoid opening heavily sealed envelope with wire string.
 No ID card, no entry be strictly enforced.
 All visitors must be processed before granting access.

Known Terrorist Groups


Boko Haram in Nigeria. Islamic State in Iraq & Syria.
Aqaeda in Afghanistan & Pakistan. Taliban in Afghanistan.
Hezbollah in Lebanon. Alshabab in Somalia.
FARC Rebels in Columbia. Hamas in Palestine

TOPIC 13: Travel, Residential and Office Security

Travel Security
 Verify the security situation in the intended location
 Avoid routes known to have recent incidents of armed communal conflict or other
forms of hostility, armed robbery or kidnapping.
 Assist at accident scenes if it is safe to do so.
 Travel only by day time
 Don’t drive under the influence of drug or alcohol or when very tired.
 Ensure your car is in good condition.
 Lock all doors and wind up the windows when on the road.
 Don’t shop behind the wheels – buying bush meat of fish on the highway is dangerous.
 Don’t give ride to strange persons.
 Don’t expose valuables in your car.
 Don’t stop at police checkpoint if there is no marked police vehicle.
 If travelling on a highway, don’t use AC except you are not alone in the car to prevent
sleep.
 If you notice a vehicle trailing you, run to a public place such as a police station, army
barrack, church, market or a bank. Don’t run to your house or your friend’s house.

Residential Security
 Watch out for the unusual during power outage.
 Cut down overgrown shrubs around your homes.
 Raise alarm when your neighbor is under attack to scare the hoodlums away. It could
be your turn tomorrow.
 If hoodlums break into your home, avoid eye to eye contact, just cooperate.
 Recruit domestic staff that have reliable guarantors.
 Don’t keep large sum of money at home, but if it is so necessary, hide it in the kitchen.
 Always lock your gate.
 Expensive women clothes and jewelries be kept in a basin while disused and worn out
clothes be kept in a box. Thieves would likely go with the box when they come.

Page 68 of 79
 Always have credit on your phone before going to bed and NEVER switch off your
phone.
 Get some phone numbers of police in your area as well as Vigilante numbers.
 When hoodlums are at your gate, pretend as if you are calling the police, this could
scare them away.
 Don’t use generator beyond 10pm. It is not a status symbol to use gen throughout the
night. If your neighbor under attack raises alarm, nobody would hear.
 Be nice to your domestic staff, but don’t let them know your financial status.
 Don’t install your water tank tower close to the fence.

Office Security
 Lock your office if you are leaving.
 Don’t leave visitors unattended to in your office.
 Don’t keep money and other expensive personal effects in your office.
 Remain in the office when the cleaner is doing his or her job.
 Ensure that all occupants in a shared office adhere to all the above tips.

Kidnapping
 If you are kidnapped, don’t resist, just cooperate
 Don’t negotiate on your behalf. Don’t make any promise to the kidnappers.
 If you are negotiating on behalf of any person, ensure there is proof of life (POL) by
demanding to speak with the hostage to avoid paying a ransom on a dead victim.

TOPIC 14: Security Management and Corporate Security

Security management refers to the identification of an organization’s assets including


employees, buildings, machines etc., followed by the development and implementation of policies and
procedures for protecting these assets. An organization uses procedures such as risk assessment, risk
analysis and security survey to identify threats and system vulnerabilities and implement effective
controls.
Corporate security is the identification and effective mitigation, at an early stage, of an
infraction that may threaten the resilience and continued survival of an organization. Such infraction
could be fraudulent act or unsafe act. It is a corporate function that oversees and manages the close
coordination of all functions within the company that are concerned with security and safety.
Core Elements of Corporate Security
 Personal security
 Physical security
 Information security
 Crime prevention and detection
 Fraud deterrence
 Investigation
 Risk assessment and mitigation
 Crisis management
 Environmental safety and health
 Business continuity planning (Contingency plan)

Page 69 of 79
TOPIC 15: Contingency Measure and Emergency Response

Contingency measure refers to Plan B. An arrangement put in place to ensure the continuity of
business even in an emergency or a disaster. An arrangement that mitigates the effect of an
unforeseen event. For example, if a chief executive officer in Benin-City is billed to attend a meeting in
Victoria Island, Lagos at 1pm with DPR officials, while booking for the first flight, there should be an
arrangement for armed escort and a serviceable SUV. If on getting to the airport, flight is cancelled due
to foggy weather, the CEO can now go by land. Time spent on contingency planning equals to time
saved when a disaster occurs.

An emergency is a sudden, unexpected situation that may cause injury, loss of life, damage to property
which requires immediate attention and remedial action.

Emergency Scenarios and Response


 Medical Emergency is an injury or illness that is acute and poses risk to a person’s life. The
victim is to be given first aid by a competent first aider and thereafter taken to the nearest
hospital.
 Fire Emergency is a sudden and unexpected fire which poses an immediate risk to lives and
property and requires urgent attention. Raise alarm, evacuate people from the building to a
mustering point and fight the fire with extinguisher if it is safe to do so. The state fire service or
a private fire service would be contacted for assistance. Security men would disallow non
firefighters from entering the premises as the fire is being fought.
 Criminal Activity refers to the intentional commission of heinous crimes such as armed robbery,
kidnapping, rape that jeopardize lives. GSF to be contacted immediately.
 Violent protest by aggrieved workers, students and secret cult rivalry can put lives at risk. The
GSF to be contacted to restore order. Force will be used only if lives are obviously threatened
as stipulated by the Voluntary Principles on security.
 Bomb Threat is a threat to detonate an explosive to cause death and destruction of property.
This threat is always through phone. The receiver of the threat must keep the caller on the
phone for a long time. Any of the GSF would be contacted immediately.
 Suicide Threat is a threat to take one’s own life in a company premises. Those who attempted
this used communication mast. If this happens, fire fighters as well as GSF to be alerted
immediately.

TOPIC 16: Executive Protection

This is also known as Close Protection. It refers to security and risk mitigation measures taken
to ensure the safety of VIPs exposed to elevated personal risk because of their employment, high
profile status, net worth and social affiliations. Protective measures may include home security
systems, body guards, armored vehicles, mail screening, private jet travel and other precautions.
Executive protection may also provide security for immediate and extended family members to prevent
kidnapping for ransom. It is a specialized field within the private security industry. Professionals
specialize in first aid, marksmanship and evasive driving.
Types of Executive Protection
1. High threat executive protection for dignitaries on international trips
2. Corporate executive protection for high net worth corporate officers
3. Celebrity close protection

Roles of Port Facility Security Officer (PFSO)

Page 70 of 79
 Conducting a comprehensive security survey of the port facility
 Ensuring the development and maintenance of the port facility security plan
 Undertaking regular security inspections of the port facility to ensure the continuation of
appropriate security measures
 Enhancing security awareness and vigilance of the port facility personnel
 Reporting to the relevant authorities and maintaining records of occurrence that threatens the
security of the port facility

Port Facility Security Plan: It is to establish:


 Measures designed to prevent weapons or any dangerous substance from entering the port
facility
 Measures designed to prevent unauthorized access to the port facility
 Procedure for responding to security threats or breaches of security
 Procedure for responding to any security instruction the govt may give
 Procedure for evacuation in case of security emergency
 Duties of port facility personnel assigned security responsibilities
 Procedure for reporting security incidents

LPG Tanker Park


 Tanker not to be parked end to end
 Parking area not to be located beneath power lines
 Parking area to be fenced from the public
 All sources of ignition to be isolated from the parking area
 Parking area to be cleared of all rubbish and combustible materials
 Appropriate fire extinguishing apparatus to be provided for parking area
 Parking of trucks to be so arranged that they will not impede firefighting access
 The park must be well illuminated

Tanker Park Supervisory Roles


 Regular survey to identify areas of improvement for the park to minimize safety incidents
 Ensure that the highest safety standards are met and implemented
 Ensure that there is no horse play and unruly behavior in the park
 Ensure that cigars, matches, firelights, GSM phones are not brought into the park
 Ensure that trucks are parked in the prescribed order
 Conducting a comprehensive security survey and risk assessment of the park to ensure the
sustenance of appropriate security and safety measures
 Enhancing security awareness and vigilance at the park
 Reporting to the relevant authority any incident that threatens the safety of the park

Causes of Explosion
 Pump seal failure
 Flange leakage
 Connecting pipework crack or fracture
 Hose leakage
 Relief valve leakage
 Boiling Liquid Expanding Vapour Explosion (BLEVE)

Page 71 of 79
FPCONs Force Protection is defined as actions taken to prevent or mitigate hostile actions against
DoD personnel, including family members, resources, facilities, and critical information. Force
Protection is implemented by establishing Force Protection Conditions, known as FPCONs. FPCONs
are a DoD-approved system that standardizes the Department’s identification and recommended
preventive actions and responses to terrorist threats to U.S. assets. There are five FPCONs for DoD.
They are NORMAL, ALPHA, BRAVO, CHARLIE, and DELTA. For more information about the DoD
Force Protection Condition System, refer to the DoD ATO Guide, which is marked for Official Use Only
(FOUO). FPCON Responsibilities Commanders will fully implement the FPCON measures according to
policy and remind their personnel to be alert for suspicious activities, such as the presence of
unfamiliar personnel and vehicles, suspicious parcels, and possible surveillance attempts, and to report
those activities in accordance with DoDI 2000.26, Suspicious Activity Reporting. Commanders also
educate their personnel on the insider threat to DoD elements and personnel in accordance with the
November 21, 2012 Presidential Memorandum and with DoDD 5205.16, The DoD Insider Threat
Program. Finally, commanders comply with and integrate DoD physical security and installation access
control policies into their FPCON plans. The FPCON system allows commanders to be flexible and
adaptable in developing and implementing antiterrorism measures that are more stringent than those
mandated by higher authorities whenever FPCONS are invoked. Commanders may augment their
FPCON by adding measures from higher FPCON standards as they deem necessary.

Page 72 of 79
Task/Activity

I - Identification: Identify the answer that corresponds to each question. Write your answers on the
space provided.

1. ______________________ This is also known as Close Protection.


2. ______________________ It refers to security and risk mitigation measures taken to ensure the
safety of VIPs exposed to elevated personal risk because of their employment, high profile status, net
worth and social affiliations.
3. ______________________ it may also provide security for immediate and extended family members
to prevent kidnapping for ransom.
4. ______________________ it is a threat to detonate an explosive to cause death and destruction of
property.
5. ______________________ it is a threat to take one’s own life in a company premises.
6. ______________________ it is an injury or illness that is acute and poses risk to a person’s life.
7. ______________________ it is a sudden and unexpected fire which poses an immediate risk to
lives and property and requires urgent attention.
8. ______________________ it refers to the intentional commission of heinous crimes such as armed
robbery, kidnapping, rape that jeopardize lives.
9. ______________________ An arrangement put in place to ensure the continuity of business even in
an emergency or a disaster.
10. _____________________ it refers to the identification of an organization’s assets including
employees, buildings, machines etc., followed by the development and implementation of policies and
procedures for protecting these assets.
11. _____________________ it is the identification and effective mitigation, at an early stage, of an
infraction that may threaten the resilience and continued survival of an organization.
12. _____________________ it is defined as actions taken to prevent or mitigate hostile actions
against DoD personnel, including family members, resources, facilities, and critical information.
13. _____________________ Force Protection is implemented by establishing Force Protection
Conditions, known as _______________.
14. _____________________ It ensures that security is an integral part of the business by providing an
enabling or conducive working environment to achieve business objectives.
15. _____________________ It is also known as a roadside bomb or a homemade bomb constructed
and deployed in ways other than in conventional military action meant to cause destruction of lives and
property by terrorists who are not fit to live among human beings.
16. _____________________ Avoid routes known to have recent incidents of armed communal conflict
or other forms of hostility, armed robbery or kidnapping.
17. _____________________ Regular survey to identify areas of improvement for the park to minimize
safety incidents
18. _____________________ is an injury or illness that is acute and poses risk to a person’s life.
19. _____________________ Raise alarm when your neighbor is under attack to scare the hoodlums
away. It could be your turn tomorrow.
20. _____________________ is a review conducted by members of your own organization, usually
with the aid of a checklist.

II – Essay: Answer the questions given below. Write your answers on the space provided. See
rubrics at the last page (10 points).

1. How do you create a security plan?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Page 73 of 79
__________________________________________________________________________________
__________________________________________________________________________________
2. What are the four objectives of planning for security?

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

3. What are the security plan components?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

4. What is an information security plan?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

5. What does a security plan include?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

6. What is security planning procedures?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Page 74 of 79
ASSESSMENT:

Reflection: The discussions must have relevant issues regarding the subject matter. (100 points)

Subject for studying: To be submitted online

1. Concept of Physical Security and Crime Prevention


2. Threats and Vulnerabilities presents a formidable challenge to the Security System Designer
3. Selection of Countermeasures
4. Strategies appropriate in Physical Security System
5. Use of IDS system

Rubric for Reflection Writing

Focus 40%
Content 30%
Organization 15%
Convention 15%
Overall 100%

Rubric for Essay Writing

4 3 2 1 Total Score
Neatness Drawing/Picture is Drawing/Picture is Drawing/Picture Drawing/Picture
in an orderly in an orderly packet is in a packet is disorderly,
packet and is and is neat with a with several with many
incredibly neat, few smudges or smudge or tears smudges or
with no smudges tears tears
or tears.
Completion All of the assigned Most of the Some of the Student do the
work is complete assigned work is assigned work is work
complete complete incomplete.
Timeliness Activity submitted Activity was 1 day Activity was 2 Activity was 3
on the due date late days late days late
Accuracy All of the answers Most of the Some of the Little to none of
are correct answers are correct answers are the answers are
correct correct
Work All work is Most of work is Some of work is Little to none of
Shown meticulously meticulously shown meticulously work is
shown shown meticulously
shown

Page 75 of 79
I – Instruction: In your owned house, you will be going to make your own physical security plan
providing for appropriate or what is applicable use to prevent or minimize criminal or disruptive
activities. It is essential that each installation, unit, or activity develop, implement, and maintain a
physical security plan. At a minimum, the plan should include special and general family orders, access
and material control, protective barrier and lighting systems, locks, and intrusion detection systems.

Table 1- Security Plan Overview


Sections of the Plan Suggested content coverage

Goals and Objectives

Security Risk
Environment

Risk Tolerance

Security Capability

Security risk
management strategies

Supporting and
evidentiary documents

Page 76 of 79
Table 2 – Suggested coverage for security plan
Governance Information Personal Security Physical Security
arrangements (including ICT)
security
Suggested coverage Suggested coverage Suggested coverage Suggested coverage
for governance for information for personnel for physical security:
arrangements: security: security:

Page 77 of 79
Rubrics
Score 25-20 points 19-15 points 14-10 points 10-0 points
Identifies, labels and Demonstrates good Demonstrates Identifies, labels and
understands all main issues understanding of the ideas limited/surface understands few issues
from the assigned chapter. presented in the chapter. understanding of the ideas from the chapters.
presented.
Content Demonstrates a clear and Demonstrates superficial
deep understanding of the understanding of the ideas
lesson. from the lesson.
Presentation contained little
to no valuable material.
Very clear and concise flow Clear flow of ideas. Presentation had moments Hard to follow the flow of
of ideas. where valuable material ideas.
Demonstrates interest in was present but as a whole
Demonstrates passionate topic. The presentation had content was lacking. Lack of enthusiasm and
Presentation interest in the topic and organizing ideas but could interest.
engagement with the have been much stronger
lesson. with better preparation. The presentation lacked
organization and had little
evidence of preparation.
Excellent research with Appropriate research into Most ideas flow but focus is No research into the lesson
clearly relevant examples to the lesson with acceptable lost at times. Limited with inappropriate choice of
reinforce understanding of examples to reinforce evidence of interest in and examples or lacking in
Examples
the topic/lesson. understanding of the engagement with the topic. examples
message and add to the
effectiveness of the lesson.
Activity Excellent points to develop Questions and discussion Weak research into the Little or no attempt to
deep understanding. addressed important lesson with poor choice of engage in learning.
information that developed examples that do not
Appropriate and imaginative understanding. Appropriate reinforce understanding of
activities used to extend activities used to clarify the message and does not
understanding in a creative understanding. aid to the effectiveness of
manner. the lesson.

II - Instruction: Since we are not allowed to do work outside, we will do it in our own home, you will be
conducting a security survey in your own house, identify what type of countermeasures applied which
covers many aspects of security around an installation or facility, what are there uses to protect your
assets and the facility. Draw your facility design put a short brief description of different security
features. Write your “Risk Analysis Surveys” and “Risk Assessment Surveys”. (100 points).

Rubrics
4 3 2 1 Total
Score
Neatness Drawing/Picture is Drawing/Picture is Drawing/Picture is Drawing/Picture is
in an orderly in an orderly in a packet with disorderly, with
packet and is packet and is neat several smudge many smudges or
incredibly neat, with a few or tears tears
with no smudges smudges or tears
or tears.
Completion All of the Most of the Some of the Student do the
assigned work is assigned work is assigned work is work incomplete.
complete complete complete
Timeliness Activity submitted Activity was 1 day Activity was 2 Activity was 3
on the due date late days late days late
Accuracy All of the answers Most of the Some of the Little to none of
are correct answers are answers are the answers are
correct correct correct
Work All work is Most of work is Some of work is Little to none of
Shown meticulously meticulously meticulously work is
shown shown shown meticulously
shown
Total Score=

Page 78 of 79
REFERENCES

BOOKS

Ajero, Joel M. (2014). Industrial & Corporate Security Management. Quezon City: Wiseman’s Books
Trading, Inc.

Corpuz, W., et al (2011). Industrial Security Management Manual. Quezon City: Wiseman’s Books
Trading, Inc.

Fulgencio, Eduardo M. (2005). Security Management Principles Techniques & Applications.


Philippines: Kadena Press-Asia Foundation, Inc.

Peckly, Miller F. (2013). Security Management Principles and Practices. Quezon City: Wiseman’s
Books Trading, Inc.

Peckly, Miller F., et al (2008). Industrial Security Management: Review Handbook for Criminologists
Licensure Examination. Quezon City: Wiseman’s Books Trading, Inc.

INTERNET SOURCES

Physical Security Handbook. (2020). Retrieved on June 1, 2020, from


https://24ai3c1jd4ue1g13v835089r-
wpengine.netdnassl.com/wpcontent/uploads/2017/12/CCC_Physical_Security_Policy_Handbo
ok.pdf

https://www.slideshare.net/FerdinandCamiloKimur/physical-security-62537747. Retrieved on June 1,


2020

https://www.slideshare.net/FerdinandCamiloKimur/physical-security-62537747?from_action=save
Retrieved on June 5, 2020

https://www.cdse.edu/documents/student-guides/PY011-guide.pdf Retrieved on July 28, 2020

https://www.getkisi.com/overview/physical-security, Retrieved on July 29, 2020

https://www.researchgate.net/publication/335107690_FUNDAMENTALS_OF_INDUSTRIAL_SECURIT
Y Retrieved on July 30, 2020

https://24ai3c1jd4ue1g13v835089r-wpengine.netdna-ssl.com/wp-
content/uploads/2017/12/CCC_Physical_Security_Policy_Handbook.pdf Retrieved on August
04, 2020

Page 79 of 79

You might also like