Professional Documents
Culture Documents
Module Lea 104 1
Module Lea 104 1
INTRODUCTION
LEARNING OBJECTIVE
1. Define security
2. Explained the concepts of assets, risks, threats and vulnerabilities.
3. Enumerate the categories of security.
4. Discuss the importance of private security in organization.
LEARNING CONTENT
Definition of Security
The word secure is derived from the Latin word secures which means “safe” of “with
care” or from word se cura, wherein se means “free from” and cura means “care”.
To be secure could mean many different things. It could mean being free from danger,
risk, injury, fear, trouble, doubt, or anxiety. Being secure could also refer to being
dependable, strong, good, impregnable or inviolable. Or simply, it could mean having
peace of mind.
Related Concept
Risk is the uncertainty of financial loss, the probability that a loss has occurred or
will occur, the variations between actual and expected results, or the possible
occurrence of an undesirable event. The end result of risk is loss or a decrease in value.
Threat and vulnerability are sometimes interchangeably used with risk. A threat
is anything that could adversary affect assets; it can be classified into natural hazards
(such as floods), accidents (chemical spills), or intentional acts (domestic or
international terrorism).
Categories of Security
1. Public security refers to the way government are ensuring the protection of its
citizens, organization and institutions against threats to their well-being, as well
as maintaining the general security and peace in public places. This includes
security against problems that have a direct impact on people’s lives, such as
gang violence, cybercrime, or trafficking of illegal drugs and firearms.
2. National Security in the requirement to maintain the survival of a state through
the use of economic power, diplomacy, and political power. Security threats
include military foes from other nations, big drug cartels, or even national
disasters that cause severe environmental damage.
3. International security consists of the measures taken by nations and international
organizations to ensure mutual survival and safety. Example of measure are
military actions and diplomatic agreements.
In the private sphere, security can be even further categorized as shown below.
Bank Security – Is the protection resulting from the application of various measures
which safeguards cash and assets which in storage, in transit and during transaction.
Hotel Security – involves using various measures of protection for the guest, personnel
properties and functions in hotels, restaurants, bars and clubs.
V.I.P. Security – Involves the protection of top – ranking officials of the government,
visiting persons of illustrious standing and foreign dignitaries.
Operation Security – This involves the protection of processes, formulas, patents, and
industrial and manufacturing activities from espionage, infiltration, loss compromise of
photo copying.
Mall/ Commercial Security – Is the degree of protection against danger, loss, and
crime inside the malls. As a form of protection, it refers to systems, structures and
processes the provide or improve mall security as a condition.
History of Security
INTRODUCTION
Security by its own definition is the state of being free from danger or threat. A
concept that is I feel sometimes forgotten in the hustle and bustle of daily life in this
modern world.
We can go back in time to see early examples in the Ancient Egyptian Pharaohs
who hired private security guards for personal protection. Or to Ancient Rome where
emperors had security guards for personal, family and property security.
LEARNING OBJECTIVE
1. Trace the historical roots of security during the prehistoric times, the ancient
period and the Middle Ages.
2. Describe the evolution of security in England and the United States.
3. Discuss the history of security in the Philippines setting.
4. Identify current issues in security.
LEARNING CONTENT
The historical roots of private security agencies can be traced back to thousands
of years when the protection of the life and personal property were up to the individual,
and later on passed to the tribes, and then to cities.
In pre historic times, recognized the need to keep himself safe from both known
and unknown enemies such as animals, other inhabitants and the environment itself. He
used different methods to keep himself safe such as crafting weapons out of stone and
metal, building fire to ward off animals, staying in caves or tree houses, and even
staying int the middle of the lake for protection.
The Greeks of the ancient period were the ones who organized the first police
force in city states which they termed polis The Romans, on the other hand, established
the Praetorian Guards known as vigils who were tasked to be fire fighter.
In the Middle Ages during their invasion of England, the French formed a group
of carefully selected men called shires or sheriff to look after the peace and order of the
different regions.
The greatest influence in the history of the security came from England. In 1655,
Oliver Cromwell set up in England and Wales a police force that operated to capture
and punish criminals. In 1748, London magistrate Henry Feilding introduces the concept
of crime prevention by organizing citizen patrol or watchmen that not only chase
criminals for felony and misdemeanor but also served Feilding’s purpose of preventing
crime ahead of time with their patrolling function. Fifty years later, English Home
Secretary Sir Robert Peel formed the formal police department.
During the colonial period in the United States, immigrants from England, Ireland and
Scotland came to America shores bringing with them this British approach to policing. At the
time, law enforcement officers had to deal with rampant crime in U.S cities and had little
time and resources left to deal with the protection for their private property. Hence, citizens
who wanted protection for their private properties had to depend on the armed immigrants
who were prepared to deal with criminals. This watchman form of security was to become
the early version of private security practices that endure to this day.
During the pre-colonial period in the Philippines, the sovereign monarchs called
datu or lakan, had servants called aliping namamahay who acted their watchman or
protector.
The Spanish colonial government introduced the Guardia Civil in the Philippines
in 1868 to serve as the police force based on the Civil Guard of Spain. They performed
patrol functions in cities and towns, organized operations for the suppression of bandits
groups, and imposed penalties for infringement of laws and local ordinances.
The constanble of the American colonial period in the Philippines became the
forebear of the present national police. During that time, a couple of constable officers
were adequate to maintain the peace and order in the town or sitio.
After World War II, the Indian national or the Bombay pioneered as the
watchman who protected a specific building or commercial establishment.
Today, private security has a major role in the preservation and protection of
peace and order in the country. It complements police efforts by providing additional
security during emergency responses and public events as well as safety precaution
and protection of property and assets.
Security in the Present Time
History shows how public law enforcement and private security evolved from the
same roots but eventually took different directions. The police served the public’s
interest while the security force served private interests. As crime became a bigger
problem especially in urban areas, police departments who previously looked down at
private security are now beginning to see the benefits of building a partnership with
them. Now, police functions that did not involve enforcement, arrests or the use of force
inside work spaces are turned over to security. Traffic control around large commercial
properties and patrol functions around private neighborhoods are also now often
provided by security officers.
With the advent of terrorism in the countries around the globe, it becomes more
important to build a strong partnership between the police who respond to terrorist acts
and security officers who respond on the private premises that they protect. This
collaboration should also involve leaders and enforcers in other fields such as
firefighting, disaster management, emergency medical treatment and public health.
This, of course, entails a strong support and commitment from the national government.
With the combination of rising technology and the security industry’s growth and
recognition in organizations comes the necessary improvement in the professionalism
among security officers.
MODULE 3
PHYSICAL SECURITY
INTRODUCTION
Every day, in every installation and within the facilities, the security practitioner
protects a wide variety of assets from various types of threats. One way they do this
through the use of physical security to deter and detect intruders. In this module, you
will learn about physical security concepts and roles, as well as physical security
planning and implementation, including a review of the various types of physical security
countermeasures employed to deter, delay, detect, or prevent threats.
LEARNING OBJECTIVE
LEARNING CONTENT
Physical Security
1. The type of access necessary will defend upon a number of variable factors and
therefor may be achieve in a number of ways.
2. There is no impenetrable barrier.
3. Defense is depth-barriers after barrier.
4. Delay provided against surreptitious and non-surreptitious entry
5. Each installation is different.
The following factor are factor that should be considered in determining the physical
security needs of a security facilities.
Site Characteristics
Environment
➢ This refers to the area, surrounding, and facilities. A bank inside a large
commercial complex in Makati City require safeguards different from those
required for an exclusive beach resort in an island in Cebu or a factory of
fireworks in an isolated area in Bulacan. For example, the bank may operate for
electronic locks and sensors, the resort may require a especially secure boat
access, and the fireworks factory may go with a perimeter fence.
Forces of Nature
Terrorism is also an important factor for certain facilities that may be considered
target of terrorist groups such as airport, tourist destinations, research laboratories and
government building.
Physical Barrier
Manmade structural barriers and natural barriers are two general types of
barriers. Often, both types are used to secure Forest Service facilities. Other types of
barriers (human barriers, such as guards; animal barriers, such as dogs).
Natural barriers include berms, rocks, trees and other foliage, water features,
sand and gravel, and other natural terrain features that are difficult to traverse or that
expose an attacker.
1. To control the movement of people and vehicle into, out of and within the facilities.
2. To segregate or compartmentalize sensitive areas.
3. To provide physical protection to object, materials, and processes of critical nature.
Types of Fencing
1. Wire Fences (Solid or Full view) - wire fencing can be barbed wire, chain link or
concertina. Chain link are for permanent structure, barbed wire is for semi-
permanent and concertina for the least permanent, and also can be used as a
temporary road block or impediment during strikes and crowd control. Wire
fences are attractive and low in maintenance cost: they offer less hazard to
people because of the absence of barbs and the openings are small to prevent
passage of pilfered article.
Second Line of Defense - Doors, floors, windows, walls, roofs and grills.
Walls, floors, roofs or their combination serve also as barriers and they should be
of such construction to provide uniform protection just like the wire fencing.
Masonry walls as perimeter barrier should have the same height as the chain-link
and surmounted at the barbed wire top guard: if the height of the Masonry is less than
the prescribed, additional chain-link as “topping” is place to attain the minimum height
requirement.
Third Line of Defense: Interior Controls - Storage system like steel cabinets, safes,
vaults and interior files.
Establishing interior controls not only maximizes the efforts of security guards.
Such measures also allow or deny access to facilities or areas within the facility, as well
as track the identity and times of entry and exit.
Locks
Identification Systems
Controlled entry into business facility usually begins with the identification of the
person entering. The identity of employees or visitors can be determined through the
following types of identification verification access control.
Types of protective alarm systems include local alarm system, auxiliary system,
central station system and proprietary system. These can serve the purpose of either
substituting other security measures for economic reasons or supplement these security
measures to provide additional controls.
PROTECTIVE LIGHTINGS
Protective lightings are designed to illuminate the perimeter barrier and the
outside approaches of an area. A threat cannot be detected, either by camera or in
person, if there is no light. Lightings can be also served as deterrence since a threat is
more likely to attack an asset in relative darkness than in bright lights.
PERSONNEL SECURITY
INTRODUCTION
LEARNING OBJECTIVE
LEARNING CONTENT
Of the three key security processes, personnel security in considered the most
important simply because security involves people, both as assets to be protected and
as sources of security threats.
➢violations
It is responsible for the investigation of current employees suspected of
of company rules and regulations.
➢and educational
To assist employees in protecting themselves through security awareness
programs.
➢ It attempts to ensure the protection of employees from discriminatory
hiring or terminating procedures as well as unfounded allegation of illegal or
unethical activities and conduct.
Pre-Employment Screening
Interviews
The job interview portion of the application also help in the screening process
because it provides an opportunity to discuss the candidate’s suitability for employment.
This interview is important because:
➢ Signatures stamped
➢ Criminal record left blank
➢ Military service left blank
➢and peers.
Loyalty – Quality of faithfulness to the organization, superiors, subordinates
➢ Application’s Name
➢ Date of Birth
➢ Present Residence Address
➢ Local Agency Check
➢ National Agency Check
➢ Personal History
➢ Marital History
➢ Residence History
➢ Citizenship History
➢ Physical Data
➢ Educational History
➢ Organization Membership
➢ Neighborhood Investigation
➢ Character References
➢ Employment History
➢ Military History
➢ Residence History
➢ Citizenship History
➢ Physical Data
➢ Education History
➢ Organization Membership
➢ Neighbor Investigation
➢ Character References
➢ Employment History
➢ Foreign Travel & Connection History
➢ Criminal Records
➢ Credit Records
➢ Applicant’s Signature
➢ Date of Application
Investigative Coverage
➢ Prior to employment for at least 7 years should be verified.
➢ Claimed education should be checked.
➢ Claimed residence should be verified
➢ If the candidate indicates a criminal record, the details should be checked.
Investigative Standard
➢ Information sought should be relevant to the hiring decision.
➢ Information should be reliable.
➢ Unfavorable information should be confirmed by at least to sources.
Investigative Review
Positive Vetting
Essence of Vetting
1. A personal interview
2. Conducted under stress
3. The interview is based upon answers previously by the applicant
4. Other information is used during the interview which confirms or denies that
given by the applicant
Basic Reasons for An Interview During Vetting
Profiling
1. The Polygraph
2. The Psychological Stress Evaluator
3. The Voice Analyzer
This type of investigation seeks to gather information on income and mode of living.
The placement of an agent in a role where his true identity is unknown, in order
to obtain information for criminal prosecution or for recovery or limitation of asset losses.
➢ Initial Interview – The initial interview will be the individual’s first contact
should be formal and professional in nature. The interview should be made by
the installation security officer or his representative.
➢ Training Conference - The training conference should be held during the
initial processing or training period of the individual.
➢ Refreshal Conference – Should be conducted semi-annually and at least
annually. It designed to serve three purposes:
➢ Security Reminders – Another phase in security education program is
concerned with security reminders. This is a Direct or passable approach. The
most common and obvious approach is through the use of poster.
➢ Special Interviews – The sixth phase is the special interview. One good
element of any approach is an appeal for help in overcoming a problem that is
common to the both security officer and the supervisors, that of the safeguarding
of classified information. This interview is important but it could develop into a
delicate situation. Therefore, the interview should be conducted by the most
mature and experienced individuals in the security organization.
Debriefing
INTRODUCTION
Many businesses around the world have had to face severe situations of data
theft and security breaches, forcing them to pay a heavy price. It is, therefore, a wise
and important decision to take security measures seriously when uploading important
documents of a business such as bookkeeping records and financial transactions.
LEARNING OBJECTIVE
LEARNING CONTENT
Protecting vital secrets from competitors and foes has become increasingly
critical in this high tech, nuclear age. The loss of document and information cost
government, Business, and Industry alike, billions of pesos. Business competitive badge
and national security have been jeopardized because the proper security precautions
were not taken. All too often the importance of document and information security is not
realized until after a loss have been discovered. In many instances one that has already
cause irreparable damage. For these reasons comprehensive document and
information security program is vital to operating and competing in our modern society.
Document and Information Security
Definition of Documents
Are any materials that contain marks, symbols or signs either visible, partially
visible or invisible that may presently or ultimately convey a meaning or message to
someone Pencil or ink writing, typewriting or printing on paper is its most usual form.
Kinds of Documents
Class III – Useful Documents – A records, the loss of which may cause inconvenience
but could be readily replace and may not present an insurmountable obstacle to the
prompt restoration of the business.
Class IV – Non-essential Documents - A records that may include daily files, routine in
nature, the loss of which will not affect the organization’s operation. This class
represents the bulk of the records which can be kept in ordinary files ready for reference
if needed and usually discarded after some period of time.
Factors to Consider
Definition of Information
Information occurs through various stages. Familiarization of the different stages can
provide significant analysis on how it can be protected.
The security measures that must be taken depend on the type of storage center,
the storage means and the storage technologies used, more importantly, the
experience and dependability of the personnel who will handle the storage and
retrieval of information must be considered.
Characteristics of Information
Information requires Barriers - Just a decade ago, information assets were stored in
computer systems with electronic barriers inside centrally controlled equipment and located
within the protected confines of a computer room. Nowadays, computer have become
widely dispersed through computer network protected through firewalls. The future trend
seems to rely on cloud-based information and data exchange (called internet networks)
protected by hosts through passwords and other computer security measures.
Information has a limited life - At some point in time certain information can lose all or
most of its value. If a business owner is in possession of valuable information, he will
want to extract from it the maximum worth possible by making it available only to those
whose talents can exploit it. When news of this information spreads to more and more
people, its value can diminish.
Sensitive Information
Sensitive information refers to information that has value and should be protected,
including the following:
➢ Proprietary business and technical information.
➢ Personal data concerning applicants, employees and former employees.
➢ Proprietary information owned by partners and obtained through an agreement.
Classification of Sensitive Information
1. Secret – This is information the unauthorized disclosure of which could cause serious
damage to the organization’s business. Its use and access to it are strictly limited.
➢ Trade Secret
➢ Plans to merge, divest, acquire, sell or reorganize
➢ Information that could affect the price of shares
➢ Information with high political or legal sensitivity
➢ Information prejudicial to the interests or reputation of the organization.
2. Restricted – This is information of such value or sensitivity that its unauthorized
disclosure could have a substantially detrimental effect on the organization’s business.
➢ Marketing Strategies
➢ Customer files
➢ Agreement and contracts
➢ Contentious or litigable matters
3. Private – This is information relating to employees.
➢ Salaries, bonuses and wages
➢ Health and medical matters
➢ Disciplinary actions
➢ Job performance
Trade Secret
A trade secret may consist of any formula, pattern, device or compilation of
information which is used on one’s business and which gives one an opportunity to gain
advantage over competitors who do not know or use it.
Patent
➢ The requirement for obtaining a patent are specific to qualify for a patent,
the invention has to represent a positive contribution beyond the skill of the
average person, whereas the trade secret needs a much lower novelty.
➢ A trade secret can remain a secret for as long as it continues to meet the
“trade secret test”, whereas an exclusive right patent after a period of 20 years.
➢ Since anyone can purchase a patent, they are not industrial espionage target
where trade secret is.