WEEK 6 Summer PDF

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 27

INTRODUCTION TO

INDUSTRIAL SECURITY
CONCEPTS
RANDALL LYN B. BLASCO, RCRIM.
PROTECTIVE LOCKS AND KEY
CONTROL
Lock is one of the most widely used physical
security devices in the asset protection program of an
installation. It complements other physical safeguards of the
installation against any possible surreptitious entry.
However, the owner of the installation or his security officer
needs to understand the weaknesses and strengths of each
type of lock including the door, window or walls to be used
to achieve maximum benefit from its application.
 A lock is defined as a mechanical,
electrical, hydraulic or electronic
LOCK device designed to prevent entry into a
building, room, container or hiding
place.
A term in
England for lock
picker,
PETERMAN safecracker, and
penetrator of
restricted areas
or room.
TYPES OF LOCK
1. Key-operated mechanical lock
2. Padlock
3. Combination lock
4. Code-operated lock
5. Electrical lock
6.Card-operated lock
1. Key-operated mechanical lock-
it uses some sort of arrangement
of internal physical barriers 1. KEY-
(wards tumblers) which prevent OPERATED
the lock from operating unless MECHANICA
they are properly aligned. The L LOCK
key is the device used to align
these internal barriers so that the
lock may be operated.
FOUR GENERAL TYPES
AND KEY CONTROL
a) Disc tumbler lock- is a lock
composed of slotted rotating
detainer discs. A specially
cut key rotates these discs
like the tumblers of a safe to
align the slots, allowing the
sidebar to drop into the
slots, thus opening the lock.
b) Pin tumbler lock- A pin-
tumbler is a cylinder-
based lock design that uses
movable pins to prevent
rotation of the plug. A key is
used to properly
elevate pins to allow the plug
to rotate and the locking bolt
to be retracted.
c) Lever tumbler lock- A lever tumbler lock involves a series of
levers, usually between three and five, that must be pushed into
the correct height for a bolt to be released. The key for this lock
type is bitted and pushes the levers into the correct position in
order for the door to be opened.
d) Warded lock- is a type of
lock that uses a set of
obstructions, or wards, to
prevent the lock from
opening unless the correct
key is inserted. The correct
key has notches or slots
corresponding to the
obstructions in the lock,
allowing it to rotate freely
inside the lock.
2. PADLOCK
2. Padlock- a portable
and detachable lock
having a sliding hasp
which passes through a
staple ring and is then
made fasten or secured.
3. COMBINATION
LOCK
3. Combination lock- instead of
using the key to align the
tumblers, the combination
mechanism uses numbers, letters
or other symbols as reference
point which enables an operator
to align them manually.
4. CODE-OPERATED LOCK

4. Code-operated lock- a
type of lock that can be
opened by pressing a series
of numbered button in the
proper sequence.
5. ELECTRICAL LOCK
5. Electrical lock- a
type of lock that can be
opened and closed
remotely by electrical
means.
6. CARD- 6. Card-operated lock- a
type of lock operated by
OPERATED LOCK coded card.
TYPES OF KEY
1. Change key- a specific key, which operates
the lock and has a particular combination of
cuts, or biting, which match the arrangement
of the tumblers in the lock.
2. Sub-master key- a key that will open all the
lock within a particular area or grouping in a
given facility
3. Master Key- a special key capable of opening a
series of lock.
4. Grand Master Key- a key that will open everything
in a system involving two or more master key
groups.
KEY CONTROL
The following methods can be used to maintain effective
key control:
1. Key cabinet- a well-constructed cabinet will have to
be procured. The cabinet will have to be sufficient size
to hold the original key to every lock in the system.
2. Key record- some administrative means must be set up
to record code numbers and indicates to whom keys to
specific locks have been issued.
3. Inventories- periodic inventories will have to be
made of all duplicate and original keys in the
hands of the employees to whom they have been
issued.
4. Audits- an unannounced audit should be made to
all key control records and procedures by a
member of management.
5. Daily report- a daily report
should be made to the person
responsible for key control from
the personnel department
indicating all persons who have
left or will be leaving the
company.
PRINCIPLE OF KEY CONTROL
1. A key depositor for securing keys during non-
working should be centrally located, locked and
kept under supervision of security personnel.
2. Key issued on daily basis, or this issued for a
specific on time purpose, should be accounted for
daily.
3. Key should be counted and signed for by security
supervisor at the beginning of each working day.
4. When the key is lost, the circumstances should be
investigated and set forth in writing.
5. All keys should be physically inspected
periodically to ensure that they have been lost
though unreported as such.
6. Careful record should be kept of such instance.
7. Master key should be in minimum.
8. Key should not be marked or should not
identify doors of locks they open.
9. Master key should not be marked identifying
them as master key.
10.Key and locks should be changed at least
once in 12 months.
THANK YOU!

You might also like