Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

(GROUP 1) (GROUP 2)

PROTECTIVE ALARM ALARM


- It is a security device that is - Is an aural or visual signal given
commonly known as a warning device. by the enunciator to security when an
intruder actuates a device in a protective
1. SENSOR OR TRIGGER DEVICE area.
- It is responsible for detecting the AUDIO DETECTION DEVICE
aural or visual signals or it can be both. - It will detect any sound caused by
2. TRANSMISSION LINE an attempted force of entry.
- A device responsible to deliver VIBRATION DETECTION DEVICE
the message to the signaling device. - It will detect any vibration
caused by an attempted force of entry.
3. ENUNCIATOR METALLIC FOIL OR WIRE
-A signaling system that activates - It will detect any action that
the alarm especially when there is danger. moves the foil or wire.
CENTRAL STATION SYSTEM LASER-BEAM ALARM
- A protective system in which the - A laser emitted floods walls or
operation of protection devices and fencing with a beam.
circuits is automatically signaled to a ELECTRIC EYE DEVICE
commercial agency. - An invisible/visible beam is
emitted.
PROPRIETARY SYSTEM MICROWAVE MOTION DETECTION
- It responds to all alarms by the DEVICE
facility’s own security or by the fire - A pattern of radio waves.
department. FOOT RAIL ACTIVATOR
LOCAL ALARM SYSTEM - Is placed on the floor in such a
- It is a warning device that can be position.
aural or visual installed in a protected BILL TRAPS
area. - Is usually placed in the teller’s
cash drawer.
AUXILIARY SYSTEM KNEE OR THIGH BUTTONS
- The installations circuits are - can be activated by knee or thigh
connected to the local police or any pressure.
concerned department. FOOT BUTTON
- relative safety while both hands
LOCAL ALARM
remain clear in view of the robbers.
- It is an alarm system installed
and applied in the establishment. INTRUSION SYSTEM
- monitors network traffic for
DIAL ALARM SYSTEM
suspicious activity and alerts when such
-This is a type of alarm system in
activity is discovered.
which there is a hotline number being set
to dial when the alarm is activated.
(GROUP 3) (GROUP 4)
LOCKS KEY CABINET
- A mechanical, electrical, and - The cabinet will have to be of
hydraulic or electronic device to prevent sufficient size to hold the original key.
entry into a building. KEY RECORDS
PADLOCKS - Set up to record code numbers of
- A portable and detachable lock the locks and who received keys to
having a sliding hasp. specific locks.
KEY-OPERATED MECHANICAL INVENTORIES
LOCK. - Periodic accounts must be made
- It prevents the lock from of all duplicates and original keys.
operating unless they are properly AUDITS
aligned. - made of all the key control
records and procedures by a member of
WARDED LOCKS the management.
- This type of lock does not provide DAILY RECORD
high-level degree of security. - A regular report must be made to the
person responsible for the key control from
DISC TUMBLER LOCKS the personnel department.
- Is a flat metal tumbler with an CHANGE KEY
open center fitted into slots. - A specific key, which operates the
LEVER TUMBLER LOCKS lock, and has a particular combination of
-Each lever in the lock hinges on a cuts.
fixed point. SUB-MASTER KEY
PIN TUMBLER LOCK - A key that could open all the locks
- a number of round pin or within a particular area.
tumblers operating a cylinder. GRAND MASTER KEY
- A key that will open everything
COMBINATION LOCKS in a system involving two or more master
- The combination mechanism uses key groups.
numbers, letters or symbols. MASTER KEYING SYSTEM
CODE OPERATED LOCKS - keys can open a group or groups
- It is a combination type of lock of locks.
that has no key needed. - Interchangeable cylinder cores in
the locks.
ELECTROMAGNETIC LOCKS KEYING
- These are devices holding a door - Used to operate an expensive lock
by magnetism. by moving it in a keyhole.
CARD OPERATED LOCKS MASTER KEYING
- These are electronically operated - Development of interchangeable
by utilizing a systematic card to open. cylinder cores.
(GROUP 4)
VAULT
MASON KEYING
- It is a robustly built fire-resistant
- The use of a key to open the main
storage facility.
entrance and the office. FILE ROOM
ONE LEVEL (CHANGE KEY) - is made lighter than a vault.
- can be operated by change key - 10,000 cubic meters, At least 12
only and keyed differently or alike or feet tall.
required.
TWO-LEVEL (MASTER KEY) (GROUP 6)
- All levels are operated by the
PERSONNEL SECURITY
change key and master key.
- Is a system of policies and
THREE-LEVEL (GMK)
procedures that seek to manage the risk of
- All locks are operated by change
staff.
keys, master keys, and grand master keys.
PRE-EMPLOYMENT SCREENING
FOUR-LEVEL (GGMK)
- Personnel security measures are
- All locks operated similarly to
usually undertaken during the
three levels.
recruitment process.
FIVE-LEVEL (GGMK)
APPLICATION FORM
- All locks operated similarly to
- Job applicants require to provide
four levels.
all relevant information and confirm its
ARTICLE 304 of the Revised Penal Code.
correctness with a signature.
Possession of Picklock or Similar Tools
INTERVIEW
- Similar tools especially to the
- provides an opportunity to
commission of crime or robbery.
discuss the candidate’s suitability for
ARTICLE 305 of the Revised Penal Code.
employment.
False Key. The term “false key”
IDENTITY VERIFICATION
- Genuine keys were stolen from
- Verifying the applicant’s identity
the owner.
is a critical measure in the screening
SECURITY CABINET
process.
- It is the final line of defense of
THE PAPER-BASED APPROACH
any facility. - It is the first method of verifying
identity.
(GROUP 5) MEDIA SEARCHES
PROTECTIVE CABINETS - Involve the evaluation of an
- High-security storage facility individual based on their online
where papers, plans, money, and other reputation.
negotiable items are held.
SAFE
- It is a metallic container.
- Weigh at least 750 lbs.
(GROUP 7)
Ongoing Personnel Security Useful Document
- manages the risk of staff or - a record, that could be readily
contractors exploiting legitimate access to replaced and may not present an
an organization’s assets or premises for insurmountable obstacle to the prompt
unauthorized purposes. restoration of the business
Security Training and Awareness Non-essential Document
- to gain the necessary skills to - a record that may include daily
perform their responsibilities within the files, routine in nature, the loss of which
organization’s security network. will not affect the organization’s
Addressing Behaviors of Concern operation.
- addressing negative behavior and Creation
ensuring that security measures are - information is discovered and
followed. developed.
Controlling Employee Access Use
- Organizations usually use access - Undoubtedly, information is
controls as physical security measures created for use.
against outsiders. Storage and Retrieval
EXIT PROCEDURES - Used information should be put
- A formal and thorough away for future use.
procedure for all staff and contractor Transfer
departures to ensure appropriate actions - This involves the transfer of
are taken to protect the organization information from active to inactive
The Exit Interview storage.
- The employee’s experiences and Information is expansive
reasons for leaving may suggest needed - It is unlike other business
changes and open the eyes of the resources because it can easily expand to
management. cover a wider scope.
Information requires barriers
- assets were stored in computer
(GROUP 8)
systems.
DOCUMENT AND INFORMATION Information is costly and important
SECURITY - Organizations should protect
- Protecting crucial documents has information assets because it is costly to
become progressively more critical in this acquire and maintain.
age of fast-growing technology. Information is coveted
Vital Document - someone wants an opportunity to
- an irreplaceable record. take it away
Information has a limited life
Important Document
- certain information can lose all
- a record of considerable expense
or most of its value.
and labor or considerable delay.

You might also like